ࡱ> !(  d fv b3 A formula for the management of access policies4.1 Use cases evolving to support functions (refining global management of local access) 4.3 Managing extension cascades for TELOS-like systems (refining the administration of planned operation chains) 4.4 Public management of civic research (refining emergent operation chains) 4.2 Instructive cooperation in software production (refining the orchestration for explanative co-action) $1-2 Modeling the meaningful access - quest for refining a management formula%1-2 Modeling the meaningful access - quest for refining a management formula"5Summary"6Summary"8Summary":Summary"<Summary">Summary/ 0LDTimes New Roman bbv 0b( 0 ` .  @n?" dd@  @@`` PL @PS)  Cv _ж_ж5%@@{uʚ; E5ʚ;g42d2dv 0bfppp@ <4!d!d` 0b b<4dddd` 0b b<4BdBd` 0b b ? %MAccess management for knowledge communities - a policy orchestration formula NL L -Ioan Rosca, Val Rosca LORNET 2007, 6 november .$N      Summary  1. Introducing the issue of "meaningful access" : from resources repository, personal rights, team coordination, technical interoperation- to accessing for acting for learning 2. Quest for refining a management formula: from instructive co-action (NUAC), resources encapsulation (ION) and aggregation (GADISA), system management (Explora) modelling (MOT+) and orchestration (VAL) to LORNET and TERMS 3. A formula for access policies management : the "operation (topology, aggregation, aspects, concretisation, management) 4. In guise of conclusion: new exploratory applications 4.1 Use cases evolving to support functions: refining global management of local access) 4.2 Instructive cooperation in software production: refining the orchestration for explanative co-action) 4.3 Managing extension cascades for TELOS-like systems: refining the administration of planned operation chains 4.4 Public management of civic research: refining emergent chainsIZZ/""",K"7""/  *  o  @   )  K  7   ' 2 2 7  3 B #  $!0/!0/%!0!0 !0!0!0H!0MQ!0Qx!0x!0!0!0!0N!0N!0!0!0/!0/!0!0!0!0!0H!0MQ!0Qx!0x!0!0!0!0N!0N!0!013 A formula for the management of access policies22 1  [4.1 Use cases evolving to support functions (refining global management of local access) H\+& &+&Z  k4.2 Instructive cooperation in software production (refining the orchestration for explanative co-action) 8l4&6&j   u4.3 Managing extension cascades for TELOS-like systems (refining the administration of planned operation chains) Hv<& 7&&  t   M4.4 Public management of civic research (refining emergent operation chains) HN'& &$&L  ` ` ̙33` 333MMM` ff3333f` f` f` 3>?" dd@,|?" dd@   " @ ` n?" dd@   @@``PR    @ ` ` p>> $(    6D%  P   T Click to edit Master title style! !  0'     RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  0,  ``   X*  0D2  `    Z*  0l3  `    Z*H  0޽h ? ̙33 Default Design 0$(  r  S  `p   r  S   `     H  0޽h ? ̙33  P$(  r  S @@   r  S A   H  0޽h ? ̙33q pp@DD ^m(  D> D c $ <$D 0   L1-2 Modeling the meaningful access - quest for refining a management formula(M"(M l 0  D0 ,$D0   D Zg ?" l$social networks, community computing%%%   D Zg ?"p0 ccomputers, telecommunications   D Z g ?"  \management, DSS, HCI  D Z g ?" p  \transactions, rollback  D Zg ?"   Yinformation science  D Z g ?"   Xcomputer security,  D Zg ?"   R web services    D Zdg ?" p  KDRM  D ZXg ?"@P XIT- legal aspects   D Z g ?"P yaction,negotiation sci.*    D Z#g ?"0 S system theory  D Z'g ?" NCSCW/L  D Z*g ?" @ s+(instructional) resources repositories, IMS,,,  D Z0.g ?"P g!distributed sys. , parallel proc."""  D Z1g ?"``  xWF management, IMSld*    D Zp5g ?" 0 P AI, agents   #  D Z9 ?"0X ) involved domains**  ] l  D,$D0 BD  `P=_ж_ж?  :  Videntity   D Zt@ ? "  d Q paradigms     D ZD ? " 3  Planguage     D Z8G ? "@ a d Q interests     D ZJ ? "0  Pcriteria     D ZxN ? "  t _perspective filters  !D ZdM ? " Gd Omethods  @D  `Q_ж_ж   V aspect space    {D  `LX_ж_ж? ` Zw  X sequencing    AD  `[_ж_ж? p W  ]synchronization  CD  `__ж_ж?  0   Tescrow  |D  `b_ж_ж? p   Rrole  }D  `$f_ж_ж?  z  Trights  D  `pi_ж_ж? `bG Y credentials    D  `m_ж_ж? 0 :g  Ucontrol  D  `\p_ж_ж? 2 Uprivacy  D  `s_ж_ж? p [ accessibility   D  `Hw_ж_ж? p@ '  Vsecurity   D  `z_ж_ж?    [ repudiability   D  `~_ж_ж? p"W W signature    D  `(_ж_ж?  Vcategory   D  `ȅ_ж_ж?   Usharing  D  `_ж_ж?  P7 Tpolicy  D  ``_ж_ж?    Y concurrence    D  `_ж_ж? ` G  Z coordination    D  `_ж_ж?   [ floor control   D  `@_ж_ж? p@ '  Upayment  D  `_ж_ж?  g  Y negotiation    D  `,_ж_ж?  w  Z facilitation    D  `̡_ж_ж?  g Vlearning   D  `l_ж_ж? `  Strust  D  `_ж_ж? 0w X adaptation    D ZX_ж_ж?PJg X automation    l P DP,$D0 #D Bg ?  3Metamorph, NUAC, SAFARI (instructional co-action )44  +  $D Bg ?  q)ADISA, ION, GADISA (wrapping resources) ***  %D Bhg ?   k#MOT+, VAL (procedural aggregation)$$$  &D Bdg ?  -Explora,Edusource SavoirNet (managing access)..8     'D Bоg ?` P z2Current projects refining access policy management333  (D Bg ? p bTERMS (negotiating access)  )D Z ?" ^exploring projects  *D Bg ?@p   h LORNET-TELOS (global management)!!!  +D B`g ? @  i!IMS,OWL,GEFO (refining functions)""" B D ZD? "@  D H ? "  I?(  D Tx ? "eE  \access unitary model  D N_ж_жP@5!0!0,l p  Dp ,$D02 ,D  `_ж_ж?  2 .D Z_ж_ж?,2 /D Z_ж_ж?0q2 0D Z_ж_ж?p2 1D Z_ж_ж?W  2 3D Z_ж_ж?  2 4D Z_ж_ж?| > 2 5D Z_ж_ж?p|  2 6D Z_ж_ж?  P2 7D Z_ж_ж?'4dt2 8D Z_ж_ж?EZ  2 9D Z_ж_ж?  !2 :D Z_ж_ж?2 ;D Z_ж_ж?  ] 2 YT  c $0>Y %  T\?"p0 UP T ' c $0H>Y )  T@?"`@ QC il @  1 P P ,$D02   Z?"@   <    6` i Actor benef  $     6lp @  i Actor assit  $  2   6  oOperation (Service)"    6`@ msupport instrum$     6p   i trace instr  $     6 p@ 0  _work instrument Z   s *x  T  c $PqWZ   s *W?Z  s * p ?r   6 p Y Mandate o    N  S px    N?" qH    T?" u ] caller tool b    T?" ?W   <xԔ   WAgent o N  B S x  T  B c $pT  B c $PpT   c $p T   c $pH T   c $pp N  S  p   NT?"  QK    N?"`   QT  +  N?" `  QC  ,  Nh?"   UP   c $4<$D 0   Vl  ? ,$D0t P `  7 P r,$D0   <| ԔP ` g function scenarios 2   N?"<     H ?"` pN `planned activity 2   H?"  2   H?"N  2   H?"    N?" `   N?" p|Pt  < ,$D0Ct   6 ,$D0   T ?"d Q1    T ?"d Q2 2 1  Z0 ?"^ UA,S,t  2  N ?"10 3  N ?"08 4  N ?"0  5  T ?"1P QR  6  N Ԕ?"8P 7  H?" P 8  N ?"1p 9  N ?"8p :  N Ԕ?"P  ;  H?"P2 <  ZX% ?"! Ua,S,t  =  N ?"e0 >  N ?"0l ?  N ?"0? @  TD*?"eP QR  A  N Ԕ?"lP B  H?"?P C  N ?"ep D  N ?"lp E  N Ԕ?"P? F  N Ԕ?"PF2 G  Z- ?"u` Ua,s,t  H  N ?" | I  N ?" J  N ?"u K  T1?" | QR  L  N Ԕ?" M  N Ԕ?"u N  N ?"u 0 O  N ?"|0 P  N Ԕ?"p Q  N Ԕ?"p2 R  Z6 ?"` SS,t  S  N ?"? T  N ?"F U  N ?" V  T@?"? QR  W  N Ԕ?"F X  H?" Y  N ?"?0 Z  N Ԕ?"p2 [  Zt< ?"uP   Sa,t  \  N ?"  |p  ]  N ?" p  ^  T?"  |  QR  _  N Ԕ?"   `  N ?"u   a  N ?"|   b  N Ԕ?" `  c  Z Ԕ?" `  < 2 d  Z  ?"P   Qt  e  N ?"? p  f  N ?" Fp  g  T?"?   QR  h  N Ԕ?" F  i  N ?" ?  j  N Ԕ?" ` 2 k  Z ?"up SA,S  l  N ?" |0 m  N ?"u0 n  T?" `| QR  o  H?"u` p  N ?"uP   q  N ?"|P   r  N Ԕ?"   s  H?"  2 t  Z ?"Fp SS R  u  N ?"?0 v  N ?"F0 w  Z Ԕ?"?` QR  x  N Ԕ?"`F y  N ?"P ?  z  N ?"P F  {  N Ԕ?"   |  H?" !  }  6" p Operation topologies  ~  T+ ?"wK Q3    T. ?",T Q4    T2 ?"t  Q5    T,7 ?"Rt  Q6    T; ?"'   Q7    T> ?"R0   Q8   N?"h  N?"J   N?"J    N?"h @  N?"h  N?"uJ   N?"Ju    N?"h u@   NC?" 0  `interaction mode    NG?" 0  \ session data      H?"  0  B H?"X 0 t pRY 5 ,$D0   <LԔ  x Oper. ations  2   2   NPP?" I  ROn    TdT ?" N aemergent activity    ZX ?"p@  Wcontext   N?"`    N?"    T?"p @2   T\?"`  TOn,m `  0  Z  s *  2   <Q p SEon 2   <d 0 SEo1    Zh?"@P Rt1   B T?"P  T?"  T?"R   T?">Y1l  T >  T,$D0t  2  T,$D0   64n@  RAs    6r   RRs T  c $h G r   6(v@ 0  RMs N ! B S   N "  S  @ N #  S Ph N $  S H 8 P    6zp 0  RAw    6`s @  x Rw work ress  2   T  B c $8 0 r   6p  `  RMw N  B S @ N   S @   N   S  0 2   TL?" 0  SCr1   T?"    N?" 8 2   Td?" _  SCrn   T?"    6H ` 5  RAr r   6Ȓ0 P  RMr   B H?" 5 0   B H?" P 2   Td?" P  RCr    6D   RAt    6 P  RRt r   6D  0  RMt N  B S  p N   S     N?" 8 G N   S  @ N   S    N   S p  N   S 0 5 P  !  N\?" ` @  QK  "  ND?" @  QT N $ S  8  &  NP?" @ UP t  3  TP,$D0   T0?"  RRb    H?"(x   6x@ RAt r   6` RMt    H?"(   B H?"(    68 p RAa    6Lp RAb    6@P RPb    6` @  RPa T  B c $y1 @T   c $ y @r   6P@ RMb r   6 0p RMa N  B S PN   S nPnPN  B S  N   S  0N   S N  B S H  @2   T?" P  SCp1   T?"P @  N?"0  2   TP?" p SCpn   T?"?x0    6   RAp r   6   RMp   B H?" P   B H?"  2   T?"p  RCp    H?"PN   S 00N  S 0N  B S N   S N   S P     N?"  @ QK    N?" @  QC N # S    *  N?"  ` UP l p  8 p ,$D0   N?"`@   <IԔ`  / metafunction (global policy)002    2   N?"P2   TtJ?"0 Z concretise    2   TP?"w0. Tedit 2   TS?"0 Wpublish 2   T$W?"0 Uchose    TpZ?"`@ Xtemplate   2   T^?" 0  Uenact 2   T\a?" 0  Wanalyse    Td?"` Z repository       THh?"` [ offer, req.       Tk?"% `  Xinstance      To?" `  Wresults    Tr?" `  Vreport    N?".(  B N?"@(   N?"(  B N?"(   N?"(  B N?"(   N?"(%   B N?" (    N?" (   B N?" (    N?" (   N?"0@e    N?"`X<    N?"0JX<    N?"0J   N?"0{J   N?"0J@   6z p0 Operation management T -  c $0e X< * ; 6   ,$D0  Operations on a wrapped resource!!   = T_ж_ж @6!0!0H  0޽h ?                           !  "           #   $     % &   ! " # $ % & '( ) * (' ) + ), - / *- . 0 + 1 , < - G . R / [ 0 d 1 k 2 t 3 4 5 6 7 8 9 : ;   < = > ? @ A B C  E  F  G  H I J L   M N   O  P Q S T U ( V . W X Z  ]   _   a   c   e   i  k m o q s  u' (  w, .  y  {  }    (   (   .   .    #  " $ . % '  -  ̙332F  EEppR)8 j@(  (!l  N),$D02 ( <d `  Lplan  !( <  [ IE Z /( s *  U Z 0( s * |Z 1(B s * ' | 2 x( <,  < Nmanage  y( <= `` J  ID  |( T_ж_ж  J  }( Z_ж_ж? p`v Z metafunction   2 ( <ܞ p   Mequip Z .( s *  ` 2 S( 6 _  @ x ( H_ж_ж  ` T    )#  `' `  ( 0   ~( T_ж_жp2 ( 6`  @ ` ( 0 ]2 ( 6 @p` @  ( <hp  @  ( < Ep <  (  `_ж_ж? @ 2 ( <   @ `2 ( 0RZ2 ( s *  9Z ( s *P  ( 6м~H @ Z2 ( s *@H2 ( 6@ pp  @ ` ( 0 "  ( < )  @ 2 ( <\w 9  @ Z ( s *pHZ ( s *`Z (B s *{2 ( <Hp0  @  ( <   @  (B T_ж_жp ( T_ж_ж0 P  ( T_ж_ж  2 ) < p00  @  ) T_ж_ж(p` ) 0Z2 ) s * Z ) s * Z ) s *>HZ2 ) s *H ) T_ж_ж(_p )B T_ж_жa   ) < UT/P   )B Z_ж_ж?`h~ )B N_ж_жh~ )B N_ж_жh ) < k0  @ x ) H_ж_ж0  ~ )B N_ж_ж(px ( H_ж_ж 8 z x )B H_ж_ж ' | x )B H_ж_ж  [UJ  ( S Г<$D 0   l   M) ,$D02 l( <0 t2   Pactivate     m( T_ж_ж U 2 ` n( 0  u Z2 o( s *  6 Z p( s * @ N  s( T_ж_ж u Y 2  t(B T_ж_ж  6 \ p  u( BК   \orchestration support  ~ (B N_ж_ж 2 Z q( s * T Z2 r( s *   ~ (B N_ж_ж 8 i @ l P0 U  J)0P U ,$D0` T( 0 PU 2 U( 6< p& @  V( < `: Ie  W( <,  <  X(  `h_ж_ж? 1 Vpt 2 Y( <  @S [ Ledit `2 Z( 0  EZ2 [( s * }\ Z \( s *  ]( 6 > Vpt Z2 ^( s * cZ c( s * Z d( s * Z e(B s *  f( BX2 Pw Nuse case    3( 6H6 ` Nscenario    (B Z_ж_ж? 2 8 @ ( <<: ` 0  QT/P  O) T_ж_жP@8!0!0 l X " R)X ",$D0 p  " L)# p  ",$D02 _( 6> 'p  " @ ` `( 0  `  a( <A    Vpt 2 b( <@@  }  @  k( T_ж_ж    v( B @p e V  Nactivity    X8  K)# X8 ,$D02 g( <8 X2   Ndesign  h( < i   _ policy tool     i(B T_ж_ж U 2  j( T_ж_ж  i  ( <| zi d  Id x ( H_ж_ж  i ~ (B N_ж_ж 8 i ~ Q) N_ж_ж H ( 0޽h ?oS((.(!((/( ( (0( (x(1(U(Y(c(V(Y(d(Y(T(e(T(g(i(g(h(j( h(a(k(!T(l(m("l(n(s(#o(_(t((x(S(|(*(Y((,(g((.(l((H(((P(g((RV(l((Ty(((V(((W(((X(((Y(((Z((([(((\())])))^)()_ )( )` )()a )))b)()c())e (()g!(x()iU(_(Q) ̙33G  u=< (  < < S ,X<$D 0   2l P  l=P ,$D0t P ? `=P ?,$D02 = 6 ? @  = NP ?" Yrw2    = N ?"P Yrw1    =  f?"d{{  =  f?"{{  = Nx ?"`  @   = Nt ?"  Yrw3   = Hx ?"x B(2  = T{ ?" Jo1  = T ?" Jo2  = Tw ?",~xe Kpb2  = T ?"D Kpb1 `2 = 0``2 = 0 = N ?"0- Jrs B = N ?"vZ = B ?"-B = N ?" vP- = Tؾ ?"`Tw Jps   =B # l3f ?" Xwork resources     =B # lD3f ?" Zsupport resource    !=B # lG3f ?"- ? Ysupport person   =B # lJ3f ?" P ^beneficiary persons   = B ?"0& =B # l O3f ? "p  ta primary developing procedure$ "  =B # ldS3f ? "  T operations    x j=B H_ж_жBk m= T_ж_жP@:!0!0El `'  u=`' ,$D0" #=B # lW3f ?"p @'  pb abstract procedure score$ " ` $= 0`R  `2 %= 0` 2 &= T\?"~ Jo1  '= T?"n1 (= T`?" Kiw1  )= T^?" Kiw2  *=  f?"7> +=  f?"7> ,= Tg?"@Uq  Kis1 Z -= s *~12 .= Tj?"`x Jo2  /=B T?"nS 0= T 5= T8?"pn Ja1  6= T?"n Ja2 2 7= Z ?"  Z Y compose model  8= Z ?"   Sauthors  9= T?" `  :=B T?"  3 ;= T?"   <= Z<?" Reditor  ==B T?" I  @=B # l3f ?" Yabstract actors   A=B # l3f ?"`  ^abstract instruments   R= 3 r_ж_ж??"x%  It  S=  f?"3 T=B # l3f ?"  Otrace   n= N\!_ж_ж``  SP n#l ` t=`,$D0` <B 0 )q < ZD ?"   Tadapters     < T?" q 32 < Z )?"   _concretise elements  <B T?" q  < T?" 0  < Z?"m Sadaptor  <B T?"@ m <  `0Ԕ?"R0( ^resources repositories  <  `<Ԕ?"H0 Zperson directories  < T?" q <B T?" q < Z( Ԕ?" Xreference system  < N?"<D < N?"<DZ < s *<D)b <B # l3f ?"`  Lc development function with concretised elements (offer, request, contract)$M L"L    >=  `HԔ?"Z0 gfunction operations directories    Z ?= s * )T `P , ]=# `P ` < 0`^ `2 < 0` 2 < T?" e  Jo1  <B T?"1f 3  < H?" q  < H?" q  <  f?"" (  <  f?"" (  < T?"@ UG Kis1 Z < s *e 1 2 < T!?"` ^  Jo2  <B T?"f   < H?"g %  <  f?"   < TX%?" &g Kas2 Z < s *^  Z < s * `(  < TH)?" f  Ja1  < T,?"` f  Ja2  < N?"G  < N?"g) <B N?"{& }  < N|+ ?"P @&  Krw1  < N4 ?" ` Zrs 1   < B ?"0  < TX7 ?"5J, Zps1    P= 3 r;_ж_ж??"K #  It  Q=  f?"VK   o= NP>_ж_ж`@   SP 'l  ) s=) ,$D0 < ZA?" ) pexecutor  *   Z <B s *9 )  < ZF?"@   Qusers  < T?" p q  < T?"  2 < ZI?"    \find and execute  < T?"  <B T?" ) ` < 0p $`2 < 0p 2 < Z\N?" 3   Je1  <B T?"A C3  < T=I=wM=<J=xM=<K=y>=<<z7=>=?={>=<<|>=<<} == =~= = =M=>=L=<P=Q=.=R=S=<U=V=U=W=X===j= ̙33E  1@P  (  0l p ` 1`p ,$D0 C0 08(p ` f  @  E0 <+ 4  @  L0 <.p 0  Xte  Z X0 s *0 _ _  o0 6 2`G ZSystem (TELOS) -core  p0 65 ` R LKMS library    q0 B90L JLKMA  r0 B<| JLKMP `B s0 0D'f `B t0 0Dp'qf  v0 6? G . VSh   0 T_ж_ж3fp  _  0 BdC M @  0 6F !  VSi   0 60J !p vAii,ih8    4 0 BMpS Piii,iih,ihi,ihhp        Z V0 s * 4 _  0 T_ж_ж M_ 2 Q0 <tT  Jc1  D1 <$Qp Y  @  21 B[ xpr @ Z W0 s * `   71 <_ pF @  :1 6Lbp P 7 VSl   41 6ep x _ HSa  51 6 i0 x@_ ZAai,ah  4 61 Bl@p@ Paii,aih,ahi,ahhp         1 T_ж_ж x 1 Htq_ж_ж P 7  UP 2 ~ 1 N_ж_ж  El ` p 1` p,$D0Z [0 s *4 h  F0 <v p @ Z Y0 s *< < Z Z0 s * h  0 6y  t WAhi   1 <} p @  1 s *ל X WAhh    1 T_ж_жh Z \0 s *h  81 <ڜh @v  @  ;1 6ݜ`  IAli  <1 <Կ` 8J @ T ]0B c $ h 2 P0 <œ   Jc2  E1B T_ж_ж h  )1 <@Ɯ0#/  @  0 <8ɜ5 p @  G0 <l͜ @[ @  0 6Ҝ P  HAl  0 H0@ @  0 00/P HAi  +1 60m HAh Z ^0 s *h 0  !1 T_ж_жh8  /1 T_ж_жh   01 T_ж_жh  J0 <    Jde  P1 B4@ @  S1 6"P  VAa   >1 6h3`  WAlh   w1 T_ж_жh   x1 T_ж_жh  1 H_ж_жP 7  UP 2 ~ 1 N_ж_ж   0 S  <$D 0    A0 6 ,$D0 y3extending resources space by recursive aggregation444 >l @  |1@ ,$D0 0 N!_ж_жPL@  3aggregates placed in internal or external contexts443  -0 6|& eI  ^S work system (TELOS)  ,0 6$ . NS user  .0 6,.  Q aggregate     /0 61  \compon  2 00 63 x Lfind 2 10 69 9 Ocompose 2 20 6l<    Opublish Z 30B s * A.wZ 40 s * x/3Z 50B s *  .wZ 60 s * 393Z 70 s * 33Z 80 s * 3 3Z 90 s * w. Z :0 s *  Z ;0 s * AuZ <0 s *  T @0B c $  y0 B A EI  X external system ~ 0 N_ж_ж -I h  0 < F \ # Srei ~ 0 N_ж_ж   0 T_ж_ж ~ 0 N_ж_ж I wh ~ 0B N_ж_ж h  0 <I  I  X external system  0B T_ж_ж I   0B T_ж_ж e   0 N!0!0H 4 0޽h ?&y444'y4v4w4(}444)y444*y4t4u4+y444,x4{4|4-z444.}4v4~4/z4v440z4441}44484449444:444;444=444>444@4644B444D444J444K4y44L444Py44R}444T444V444X444\4^{44_4`4a4b4c4d4e4g444i444 ̙33r@0" *, w O]. ^Y Oh+'0 `h  !Operations on a wrapped resourceMiVRrVRr63rMicrosoft PowerPointed @&T@@@@G;  1&@ &&#TNPPl2OMi & TNPP &&TNPP   @ - "-- !@-- "-&9 4& - & 4& --!s3-- @Times New Roman- .(2 Access management for " %%  . .(2 xknowledge communities #  %$   . . 2 P-. . 2 la  . .12 qpolicy orchestration formula     % .--Fs-- @Times New Roman- .2 k Ioan Rosca   . .2 k|, Val  . .2 kRosca . .2 LORNET 2007, 6    . .2 november .-- "System-&TNPP & ՜.+,D՜.+,`    On-screen Show -sYa  Times New RomanDefault DesignNAccess management for knowledge communities - a policy orchestration formula SummaryM1-2 Modeling the meaningful access - quest for refining a management formula23 A formula for the management of access policies\4.1 Use cases evolving to support functions (refining global management of local access) l4.2 Instructive cooperation in software production (refining the orchestration for explanative co-action) v4.3 Managing extension cascades for TELOS-like systems (refining the administration of planned operation chains) N4.4 Public management of civic research (refining emergent operation chains)  Fonts UsedDesign Template Slide Titles 8@ _PID_HLINKSAPN8257,5,3 A formula for the management of access policiesa263,6,4.1 Use cases evolving to support functions (refining global management of local access) x265,8,4.3 Managing extension cascades for TELOS-like systems (refining the administration of planned operation chains) T266,9,4.4 Public management of civic research (refining emergent operation chains) r268,7,4.2 Instructive cooperation in software production (refining the orchestration for explanative co-action) S270,3,1-2 Modeling the meaningful access - quest for refining a management formulaS270,3,1-2 Modeling the meaningful access - quest for refining a management formula260,2,Summary260,2,Summary260,2,Summary260,2,Summary260,2,Summary260,2,Summary_YVRVR  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root EntrydO)Current UserSummaryInformation(PowerPoint Document(YDocumentSummaryInformation8Root EntrydO)qS@Current User/SummaryInformation(PowerPoint Document(Y_Y$RoscaRosca