����JFIFXX�����    $.' ",#(7),01444'9=82<.342  2!!22222222222222222222222222222222222222222222222222����"��4�� ���,�PG"Z_�4�˷����kjز�Z�,F+��_z�,�© �����zh6�٨�ic�fu���#ډb���_�N�?��wQ���5-�~�I���8����TK<5o�Iv-�����k�_U_�����~b�M��d����Ӝ�U�Hh��?]��E�w��Q���k�{��_}qFW7HTՑ��Y��F�?_�'ϔ��_�Ջt��=||I ��6�έ"�����D���/[�k�9���Y�8ds|\���Ҿp6�Ҵ���]��.����6�z<�v��@]�i%��$j��~�g��J>��no����pM[me�i$[����s�o�ᘨ�˸ nɜG-�ĨU�ycP�3.DB�li�;��hj���x7Z^�N�h������N3u{�:j�x�힞��#M&��jL P@_���� P��&��o8������9�����@Sz6�t7#O�ߋ �s}Yf�T���lmr����Z)'N��k�۞p����w\�Tȯ?�8`�O��i{wﭹW�[�r�� ��Q4F�׊���3m&L�=��h3����z~��#�\�l :�F,j@�� ʱ�wQT����8�"kJO���6�֚l����}���R�>ډK���]��y����&����p�}b��;N�1�m�r$�|��7�>e�@B�TM*-iH��g�D�)� E�m�|�ؘbҗ�a��Ҿ����t4���o���G��*oCN�rP���Q��@z,|?W[0�����:�n,jWiE��W��$~/�hp\��?��{(�0���+�Y8rΟ�+����>S-S����VN;�}�s?.����� w�9��˟<���Mq4�Wv'��{)0�1mB��V����W[�����8�/<� �%���wT^�5���b��)iM� pg�N�&ݝ��VO~�q���u���9� ����!��J27����$O-���! �:�%H��� ـ����y�ΠM=t{!S�� oK8������t<����è:a������[�����ա�H���~��w��Qz`�po�^ ����Q��n� �,uu�C�$ ^���,������8�#��:�6��e�|~���!�3�3.�\0��q��o�4`.|� ����y�Q�`~;�d�ׯ,��O�Zw�������`73�v�܋�<���Ȏ�� ـ4k��5�K�a�u�=9Yd��$>x�A�&�� j0� ���vF��� Y�|�y��� ~�6�@c��1vOp�Ig����4��l�OD���L����� R���c���j�_�uX6��3?nk��Wy�f;^*B� ��@�~a�`��Eu������+���6�L��.ü>��}y���}_�O�6�͐�:�YrG�X��kG�����l^w���~㒶sy��Iu�!� W ��X��N�7BV��O��!X�2����wvG�R�f�T#�����t�/?���%8�^�W�aT��G�cL�M���I��(J����1~�8�?aT ���]����AS�E��(��*E}� 2��#I/�׍qz��^t�̔���b�Yz4x���t�){ OH��+(E��A&�N�������XT��o��"�XC��'���)}�J�z�p� ��~5�}�^����+�6����w��c��Q�|Lp�d�H��}�(�.|����k��c4^�"�����Z?ȕ ��a<�L�!039C� �Eu�C�F�Ew�ç ;�n?�*o���B�8�bʝ���'#Rqf���M}7����]����s2tcS{�\icTx;�\��7K���P���ʇ Z O-��~��c>"��?�������P��E��O�8��@�8��G��Q�g�a�Վ���󁶠�䧘��_%#r�>�1�z�a��eb��qcPѵ��n���#L��� =��׀t� L�7�`��V���A{�C:�g���e@�w1 Xp3�c3�ġ����p��M"'-�@n4���fG��B3�DJ�8[Jo�ߐ���gK)ƛ��$���� ���8�3�����+���� �����6�ʻ���� ���S�kI�*KZlT _`���?��K����QK�d����B`�s}�>���`��*�>��,*@J�d�oF*����弝��O}�k��s��]��y�ߘ��c1G�V���<=�7��7����6�q�PT��tXԀ�!9*4�4Tހ3XΛex�46���Y��D ����� �BdemDa����\�_l,��G�/���֌7���Y�](�xTt^%�GE�����4�}bT���ڹ�����;Y)���B�Q��u��>J/J �⮶.�XԄ��j�ݳ�+E��d ��r�5�_D�1 ��o�� �B�x�΢�#���<��W�����8���R6�@g�M�.��� dr�D��>(otU��@x=��~v���2� ӣ�d�oBd��3�eO�6�㣷�����ݜ6��6Y��Qz`��S��{���\P�~z m5{J/L��1������<�e�ͅPu�b�]�ϔ���'������f�b� Zpw��c`"��i���BD@:)ִ�:�]��hv�E�w���T�l��P���"Ju�}��وV J��G6��. J/�Qgl߭�e�����@�z�Zev2u�)]կ�����7x���s�M�-<ɯ�c��r�v�����@��$�ޮ}lk���a���'����>x��O\�ZFu>�����ck#��&:��`�$�ai�>2Δ����l���oF[h��lE�ܺ�Πk:)���`�� $[6�����9�����kOw�\|���8}������ބ:��񶐕��I�A1/�=�2[�,�!��.}gN#�u����b��� ~��݊��}34q����d�E��Lc��$��"�[q�U�硬g^��%B �z���r�pJ�ru%v\h1Y�ne`ǥ:g���pQM~�^�Xi� ��`S�:V29.�P���V�?B�k�� AEvw%�_�9C�Q����wKekPؠ�\�;Io d�{ ߞo�c1eP����\� `����E=���@K<�Y���eڼ�J���w����{av�F�'�M�@/J��+9p���|]�����Iw &`��8���&M�hg��[�{��Xj��%��Ӓ�$��(����ʹN���<>�I���RY���K2�NPlL�ɀ)��&e����B+ь����( � �JTx���_?EZ� }@ 6�U���뙢ط�z��dWI�n` D����噥�[��uV��"�G&Ú����2g�}&m��?ċ�"����Om#��������� ��{�ON��"S�X��Ne��ysQ���@Fn��Vg���dX�~nj�]J�<�K]:��FW��b�������62�=��5f����JKw��bf�X�55��~J �%^����:�-�QIE��P��v�nZum� z � ~ə ���� ���ة����;�f��\v���g�8�1��f24;�V���ǔ�)����9���1\��c��v�/'Ƞ�w�������$�4�R-��t���� e�6�/�ġ �̕Ecy�J���u�B���<�W�ַ~�w[B1L۲�-JS΂�{���΃������A��20�c#��@ 0!1@AP"#2Q`$3V�%45a6�FRUq��� ����^7ׅ,$n�������+��F�`��2X'��0vM��p�L=������5��8������u�p~���.�`r�����\���O��,ư�0oS ��_�M�����l���4�kv\JSd���x���SW�<��Ae�IX����������$I���w�:S���y���›R��9�Q[���,�5�;�@]�%���u�@ *ro�lbI �� ��+���%m:�͇ZV�����u�̉����θau<�fc�.����{�4Ա� �Q����*�Sm��8\ujqs]{kN���)qO�y�_*dJ�b�7���yQqI&9�ԌK!�M}�R�;������S�T���1���i[U�ɵz�]��U)V�S6���3$K{�ߊ<�(� E]Զ[ǼENg�����'�\?#)Dkf��J���o��v���'�%ƞ�&K�u�!��b�35LX�Ϸ��63$K�a�;�9>,R��W��3�3� d�JeTYE.Mϧ��-�o�j3+y��y^�c�������VO�9NV\nd�1 ��!͕_)a�v;����թ�M�lWR1��)El��P;��yوÏ�u 3�k�5Pr6<�⒲l�!˞*��u־�n�!�l:����UNW ��%��Chx8vL'��X�@��*��)���̮��ˍ��� ���D-M�+J�U�kvK����+�x8��cY������?�Ԡ��~3mo��|�u@[XeY�C�\Kp�x8�oC�C�&����N�~3-H���� ��MX�s�u<`���~"WL��$8ξ��3���a�)|:@�m�\���^�`�@ҷ)�5p+��6���p�%i)P M���ngc�����#0Aruz���RL+xSS?���ʮ}()#�t��mˇ!��0}}y����<�e� �-ή�Ԩ��X������ MF���ԙ~l L.3���}�V뽺�v�����멬��Nl�)�2����^�Iq��a��M��qG��T�����c3#������3U�Ǎ���}��לS�|qa��ڃ�+���-��2�f����/��bz��ڐ�� �ݼ[2�ç����k�X�2�* �Z�d���J�G����M*9W���s{��w���T��x��y,�in�O�v��]���n����P�$�JB@=4�OTI�n��e�22a\����q�d���%�$��(���:���: /*�K[PR�fr\nڙdN���F�n�$�4�[�� U�zƶ����� �mʋ���,�ao�u 3�z� �x��Kn����\[��VFmbE;�_U��&V�Gg�]L�۪&#n%�$ɯ�dG���D�TI=�%+AB�Ru#��b4�1�»x�cs�YzڙJG��f��Il��d�eF'T� iA��T���uC�$����Y��H?����[!G`}���ͪ� �纤Hv\������j�Ex�K���!���OiƸ�Yj�+u-<���'q����uN�*�r\��+�]���<�wOZ.fp�ێ��,-*)V?j-kÊ#�`�r��dV����(�ݽBk�����G�ƛk�QmUڗe��Z���f}|����8�8��a���i��3'J�����~G_�^���d�8w������ R�`(�~�.��u���l�s+g�bv���W���lGc}��u���afE~1�Ue������Z�0�8�=e�� f@/�jqEKQQ�J��oN��J���W5~M>$6�Lt�;$ʳ{���^��6�{����v6���ķܰg�V�cnn �~z�x�«�,2�u�?cE+Ș�H؎�%�Za�)���X>uW�Tz�Nyo����s���FQƤ��$��*�&�LLXL)�1�" L��eO��ɟ�9=���:t��Z���c��Ž���Y?�ӭV�wv�~,Y��r�ۗ�|�y��GaF�����C�����.�+� ���v1���fήJ�����]�S��T��B��n5sW}y�$��~z�'�c ��8 ��� ,! �p��VN�S��N�N�q��y8z˱�A��4��*��'������2n<�s���^ǧ˭P�Jޮɏ�U�G�L�J�*#��<�V��t7�8����TĜ>��i}K%,���)[��z�21z ?�N�i�n1?T�I�R#��m-�����������������1����lA�`��fT5+��ܐ�c�q՝��ʐ��,���3�f2U�եmab��#ŠdQ�y>\��)�SLY����w#��.���ʑ�f��� ,"+�w�~�N�'�c�O�3F�������N<���)j��&��,-� �љ���֊�_�zS���TǦ����w�>��?�������n��U仆�V���e�����0���$�C�d���rP �m�׈e�Xm�Vu� �L��.�bֹ��� �[Դaզ���*��\y�8�Է:�Ez\�0�Kq�C b��̘��cө���Q��=0Y��s�N��S.���3.���O�o:���#���v7�[#߫ ��5�܎�L���Er4���9n��COWlG�^��0k�%<���ZB���aB_���������'=��{i�v�l�$�uC���mƎҝ{�c㱼�y]���W�i ��ߧc��m�H� m�"�"�����;Y�ߝ�Z�Ǔ�����:S#��|}�y�,/k�Ld� TA�(�AI$+I3��;Y*���Z��}|��ӧO��d�v��..#:n��f>�>���ȶI�TX��� 8��y����"d�R�|�)0���=���n4��6ⲑ�+��r<�O�܂~zh�z����7ܓ�HH�Ga롏���nCo�>������a ���~]���R���̲c?�6(�q�;5%� |�uj�~z8R=X��I�V=�|{v�Gj\gc��q����z�؋%M�ߍ����1y��#��@f^���^�>N�����#x#۹��6�Y~�?�dfPO��{��P�4��V��u1E1J �*|���%���JN��`eWu�zk M6���q t[�� ��g�G���v��WIG��u_ft����5�j�"�Y�:T��ɐ���*�;� e5���4����q$C��2d�}���� _S�L#m�Yp��O�.�C�;��c����Hi#֩%+) �Ӎ��ƲV���SYź��g |���tj��3�8���r|���V��1#;.SQ�A[���S������#���`n�+���$��$I �P\[�@�s��(�ED�z���P��])8�G#��0B��[ى��X�II�q<��9�~[Z멜�Z�⊔IWU&A>�P~�#��dp<�?����7���c��'~���5 ��+$���lx@�M�dm��n<=e�dyX��?{�|Aef ,|n3�<~z�ƃ�uۧ�����P��Y,�ӥQ�*g�#먙R�\���;T��i,��[9Qi歉����c>]9�� ��"�c��P�� �Md?٥��If�ت�u��k��/����F��9�c*9��Ǎ:�ØF���z�n*�@|I�ށ9����N3{'��[�'ͬ�Ҳ4��#}��!�V� Fu��,�,mTIk���v C�7v���B�6k�T9��1�*l� '~��ƞF��lU��'�M ����][ΩũJ_�{�i�I�n��$���L�� j��O�dx�����kza۪��#�E��Cl����x˘�o�����V���ɞ�ljr��)�/,�߬h�L��#��^��L�ф�,íMƁe�̩�NB�L�����iL����q�}��(��q��6IçJ$�W�E$��:������=#����(�K�B����zђ <��K(�N�۫K�w��^O{!����)�H���>x�������lx�?>Պ�+�>�W���,Ly!_�D���Ō�l���Q�!�[ �S����J��1��Ɛ�Y}��b,+�Lo�x�ɓ)����=�y�oh�@�꥟/��I��ѭ=��P�y9��� �ۍYӘ�e+�p�Jnϱ?V\SO%�(�t� ���=?MR�[Ș�����d�/ ��n�l��B�7j� ��!�;ӥ�/�[-���A�>�dN�sLj ��,ɪv��=1c�.SQ�O3�U���ƀ�ܽ�E����������̻��9G�ϷD�7(�}��Ävӌ\�y�_0[w ���<΍>����a_��[0+�L��F.�޺��f�>oN�T����q;���y\��bՃ��y�jH�<|q-eɏ�_?_9+P���Hp$�����[ux�K w�Mw��N�ی'$Y2�=��q���KB��P��~������Yul:�[<����F1�2�O���5=d����]Y�sw:���Ϯ���E��j,_Q��X��z`H1,#II ��d�wr��P˂@�ZJV����y$�\y�{}��^~���[:N����ߌ�U�������O��d�����ؾe��${p>G��3c���Ė�lʌ�� ת��[��`ϱ�-W����dg�I��ig2��� ��}s ��ؤ(%#sS@���~���3�X�nRG�~\jc3�v��ӍL��M[JB�T��s3}��j�Nʖ��W����;7��ç?=X�F=-�=����q�ߚ���#���='�c��7���ڑW�I(O+=:uxq�������������e2�zi+�kuG�R��������0�&e�n���iT^J����~\jy���p'dtG��s����O��3����9* �b#Ɋ�� p������[Bws�T�>d4�ۧs���nv�n���U���_�~,�v����ƜJ1��s�� �QIz��)�(lv8M���U=�;����56��G���s#�K���MP�=��LvyGd��}�VwWBF�'�à �?MH�U�g2�� ����!�p�7Q��j��ڴ����=��j�u��� Jn�A s���uM������e��Ɔ�Ҕ�!)'��8Ϣ�ٔ��ޝ(��Vp���צ֖d=�IC�J�Ǡ{q������kԭ�߸���i��@K����u�|�p=..�*+����x�����z[Aqġ#s2a�Ɗ���RR�)*HRsi�~�a &f��M��P����-K�L@��Z��Xy�'x�{}��Zm+���:�)�) IJ�-i�u���� ���ܒH��'�L(7�y�GӜq���� j��� 6ߌg1�g�o���,kر���tY�?W,���p���e���f�OQS��!K�۟cҒA�|ս�j�>��=⬒��˧L[�� �߿2JaB~R��u�:��Q�] �0H~���]�7��Ƽ�I���(}��cq '�ήET���q�?f�ab���ӥvr� �)o��-Q��_'����ᴎo��K������;��V���o��%���~OK ����*��b�f:���-ťIR��`B�5!RB@���ï�� �u �̯e\�_U�_������� g�ES��3�������QT��a����x����U<~�c?�*�#]�MW,[8O�a�x��]�1bC|踤�P��lw5V%�)�{t�<��d��5���0i�XSU��m:��Z�┵�i�"��1�^B�-��P�hJ��&)O��*�D��c�W��vM��)����}���P��ܗ-q����\mmζZ-l@�}��a��E�6��F�@��&Sg@���ݚ�M����� ȹ 4����#p�\H����dYDo�H���"��\��..R�B�H�z_�/5˘����6��KhJR��P�mƶi�m���3�,#c�co��q�a)*Pt����R�m�k�7x�D�E�\Y�閣_X�<���~�)���c[[�BP����6�Yq���S��0����%_����;��Àv�~�| VS؇ ��'O0��F0��\���U�-�d@�����7�SJ*z��3n��y��P����O���������m�~�P�3|Y��ʉr#�C�<�G~�.,! ���bqx���h~0=��!ǫ�jy����l�O,�[B��~��|9��ٱ����Xly�#�i�B��g%�S��������tˋ���e���ې��\[d�t)��.+u�|1 ������#�~Oj����hS�%��i.�~X���I�H�m��0n���c�1uE�q��cF�RF�o���7� �O�ꮧ� ���ۛ{��ʛi5�rw?׌#Qn�TW��~?y$��m\�\o����%W� ?=>S�N@�� �Ʈ���R����N�)�r"C�:��:����� �����#��qb��Y�. �6[��2K����2u�Ǧ�HYR��Q�MV��� �G�$��Q+.>�����nNH��q�^��� ����q��mM��V��D�+�-�#*�U�̒ ���p욳��u:�������IB���m���PV@O���r[b= �� ��1U�E��_Nm�yKbN�O���U�}�the�`�|6֮P>�\2�P�V���I�D�i�P�O;�9�r�mAHG�W�S]��J*�_�G��+kP�2����Ka�Z���H�'K�x�W�MZ%�O�YD�Rc+o��?�q��Ghm��d�S�oh�\�D�|:W������UA�Qc yT�q������~^�H��/��#p�CZ���T�I�1�ӏT����4��"�ČZ�����}��`w�#�*,ʹ�� ��0�i��課�Om�*�da��^gJ݅{���l�e9uF#T�ֲ��̲�ٞC"�q���ߍ ոޑ�o#�XZTp����@ o�8��(jd��xw�]�,f���`~�|,s��^����f�1���t��|��m�򸄭/ctr��5s��7�9Q�4�H1꠲BB@l9@���C�����+�wp�xu�£Yc�9��?`@#�o�mH�s2��)�=��2�.�l����jg�9$�Y�S�%*L������R�Y������7Z���,*=�䷘$�������arm�o�ϰ���UW.|�r�uf����IGw�t����Zwo��~5 ��YյhO+=8fF�)�W�7�L9lM�̘·Y���֘YLf�큹�pRF���99.A �"wz��=E\Z���'a� 2��Ǚ�#;�'}�G���*��l��^"q��+2FQ� hj��kŦ��${���ޮ-�T�٭cf�|�3#~�RJ����t��$b�(R��(����r���dx� >U b�&9,>���%E\� Ά�e�$��'�q't��*�א���ެ�b��-|d���SB�O�O��$�R+�H�)�܎�K��1m`;�J�2�Y~9��O�g8=vqD`K[�F)k�[���1m޼c��n���]s�k�z$@��)!I �x՝"v��9=�ZA=`Ɠi �:�E��)`7��vI��}d�YI�_ �o�:ob���o ���3Q��&D&�2=�� �Ά��;>�h����y.*ⅥS������Ӭ�+q&����j|UƧ����}���J0��WW< ۋS�)jQR�j���Ư��rN)�Gű�4Ѷ(�S)Ǣ�8��i��W52���No˓� ۍ%�5brOn�L�;�n��\G����=�^U�dI���8$�&���h��'���+�(������cȁ߫k�l��S^���cƗjԌE�ꭔ��gF���Ȓ��@���}O���*;e�v�WV���YJ\�]X'5��ղ�k�F��b 6R�o՜m��i N�i����>J����?��lPm�U��}>_Z&�KK��q�r��I�D�Չ~�q�3fL�:S�e>���E���-G���{L�6p�e,8��������QI��h��a�Xa��U�A'���ʂ���s�+טIjP�-��y�8ۈZ?J$��W�P� ��R�s�]��|�l(�ԓ��sƊi��o(��S0��Y� 8�T97.�����WiL��c�~�dxc�E|�2!�X�K�Ƙਫ਼�$((�6�~|d9u+�qd�^3�89��Y�6L�.I�����?���iI�q���9�)O/뚅����O���X��X�V��ZF[�یgQ�L��K1���RҖr@v�#��X�l��F���Нy�S�8�7�kF!A��sM���^rkp�jP�DyS$N���q��nxҍ!U�f�!eh�i�2�m���`�Y�I�9r�6� �TF���C}/�y�^���Η���5d�'��9A-��J��>{�_l+�`��A���[�'��յ�ϛ#w:݅�%��X�}�&�PSt�Q�"�-��\縵�/����$Ɨh�Xb�*�y��BS����;W�ջ_mc�����vt?2}1�;qS�d�d~u:2k5�2�R�~�z+|HE!)�Ǟl��7`��0�<�,�2*���Hl-��x�^����'_TV�gZA�'j� ^�2Ϊ��N7t�����?w�� �x1��f��Iz�C-Ȗ��K�^q�;���-W�DvT�7��8�Z�������� hK�(P:��Q- �8�n�Z���܃e貾�<�1�YT<�,�����"�6{/ �?�͟��|1�:�#g��W�>$����d��J��d�B��=��jf[��%rE^��il:��B���x���Sּ�1հ��,�=��*�7 fcG��#q� �eh?��2�7�����,�!7x��6�n�LC�4x��},Geǝ�tC.��vS �F�43��zz\��;QYC,6����~;RYS/6���|2���5���v��T��i����������mlv��������&� �nRh^ejR�LG�f���? �ۉҬܦƩ��|��Ȱ����>3����!v��i�ʯ�>�v��オ�X3e���_1z�Kȗ\<������!�8���V��]��?b�k41�Re��T�q��mz��TiOʦ�Z��Xq���L������q"+���2ۨ��8}�&N7XU7Ap�d�X��~�׿��&4e�o�F��� �H����O���č�c�� 懴�6���͉��+)��v;j��ݷ�� �UV�� i��� j���Y9GdÒJ1��詞�����V?h��l����l�cGs�ځ�������y�Ac�����\V3�? �� ܙg�>qH�S,�E�W�[�㺨�uch�⍸�O�}���a��>�q�6�n6����N6�q������N ! 1AQaq�0@����"2BRb�#Pr���3C`��Scst���$4D���%Td�� ?���N����a��3��m���C���w��������xA�m�q�m���m������$����4n淿t'��C"w��zU=D�\R+w�p+Y�T�&�պ@��ƃ��3ޯ?�Aﶂ��aŘ���@-�����Q�=���9D��ռ�ѻ@��M�V��P��܅�G5�f�Y<�u=,EC)�<�Fy'�"�&�չ�X~f��l�KԆV��?�� �W�N����=(� �;���{�r����ٌ�Y���h{�١������jW����P���Tc�����X�K�r��}���w�R��%��?���E��m�� �Y�q|����\lEE4���r���}�lsI�Y������f�$�=�d�yO����p�����yBj8jU�o�/�S��?�U��*������ˍ�0������u�q�m [�?f����a�� )Q�>����6#������� ?����0UQ����,IX���(6ڵ[�DI�MNލ�c&���υ�j\��X�R|,4��� j������T�hA�e��^���d���b<����n�� �즇�=!���3�^�`j�h�ȓr��jẕ�c�,ٞX����-����a�ﶔ���#�$��]w�O��Ӫ�1y%��L�Y<�wg#�ǝ�̗`�x�xa�t�w��»1���o7o5��>�m뭛C���Uƃߜ}�C���y1Xνm�F8�jI���]����H���ۺиE@I�i;r�8ӭ����V�F�Շ| ��&?�3|x�B�MuS�Ge�=Ӕ�#BE5G�����Y!z��_e��q�р/W>|-�Ci߇�t�1ޯќd�R3�u��g�=0 5��[?�#͏��q�cf���H��{ ?u�=?�?ǯ���}Z��z���hmΔ�BFTW�����<�q�(v� ��!��z���iW]*�J�V�z��gX֧A�q�&��/w���u�gYӘa���; �i=����g:��?2�dž6�ى�k�4�>�Pxs����}������G�9��3 ���)gG�R<>r h�$��'nc�h�P��Bj��J�ҧH� -��N1���N��?��~��}-q!=��_2hc�M��l�vY%UE�@|�v����M2�.Y[|y�"Eï��K�ZF,�ɯ?,q�?v�M 80jx�"�;�9vk�����+ ֧�� �ȺU��?�%�vcV��mA�6��Qg^M����A}�3�nl� QRN�l8�kkn�'�����(��M�7m9و�q���%ޟ���*h$Zk"��$�9��: �?U8�Sl��,,|ɒ��xH(ѷ����Gn�/Q�4�P��G�%��Ա8�N��!� �&�7�;���eKM7�4��9R/%����l�c>�x;������>��C�:�����t��h?aKX�bhe�ᜋ^�$�Iհ �hr7%F$�E��Fd���t��5���+�(M6�t����Ü�UU|zW�=a�Ts�Tg������dqP�Q����b'�m���1{|Y����X�N��b �P~��F^F:����k6�"�j!�� �I�r�`��1&�-$�Bevk:y���#yw��I0��x��=D�4��tU���P�ZH��ڠ底taP��6����b>�xa����Q�#� WeF��ŮNj�p�J* mQ�N����*I�-*�ȩ�F�g�3 �5��V�ʊ�ɮ�a��5F���O@{���NX��?����H�]3��1�Ri_u��������ѕ�� ����0��� F��~��:60�p�͈�S��qX#a�5>���`�o&+�<2�D����: �������ڝ�$�nP���*)�N�|y�Ej�F�5ټ�e���ihy�Z �>���k�bH�a�v��h�-#���!�Po=@k̆IEN��@��}Ll?j�O������߭�ʞ���Q|A07x���wt!xf���I2?Z��<ץ�T���cU�j��]��陎Ltl �}5�ϓ��$�,��O�mˊ�;�@O��jE��j(�ا,��LX���LO���Ц�90�O �.����a��nA���7������j4 ��W��_ٓ���zW�jcB������y՗+EM�)d���N�g6�y1_x��p�$Lv:��9�"z��p���ʙ$��^��JԼ*�ϭ����o���=x�Lj�6�J��u82�A�H�3$�ٕ@�=Vv�]�'�qEz�;I˼��)��=��ɯ���x �/�W(V���p�����$ �m�������u�����񶤑Oqˎ�T����r��㠚x�sr�GC��byp�G��1ߠ�w e�8�$⿄����/�M{*}��W�]˷.�CK\�ުx���/$�WPw���r� |i���&�}�{�X� �>��$-��l���?-z���g����lΆ���(F���h�vS*���b���߲ڡn,|)mrH[���a�3�ר�[1��3o_�U�3�TC�$��(�=�)0�kgP���� ��u�^=��4 �WYCҸ:��vQ�ר�X�à��tk�m,�t*��^�,�}D*� �"(�I��9R����>`�`��[~Q]�#af��i6l��8���6�:,s�s�N6�j"�A4���IuQ��6E,�GnH��zS�HO�uk�5$�I�4��ؤ�Q9�@��C����wp�BGv[]�u�Ov���0I4���\��y�����Q�Ѹ��~>Z��8�T��a��q�ޣ;z��a���/��S��I:�ܫ_�|������>=Z����8:�S��U�I�J��"IY���8%b8���H��:�QO�6�;7�I�S��J��ҌAά3��>c���E+&jf$eC+�z�;��V����� �r���ʺ������my�e���aQ�f&��6�ND��.:��NT�vm�<- u���ǝ\MvZY�N�NT��-A�>jr!S��n�O 1�3�Ns�%�3D@���`������ܟ 1�^c<���� �a�ɽ�̲�Xë#�w�|y�cW�=�9I*H8�p�^(4���՗�k��arOcW�tO�\�ƍR��8����'�K���I�Q�����?5�>[�}��yU�ײ -h��=��% q�ThG�2�)���"ו3]�!kB��*p�FDl�A���,�eEi�H�f�Ps�����5�H:�Փ~�H�0Dت�D�I����h�F3�������c��2���E��9�H��5�zԑ�ʚ�i�X�=:m�xg�hd(�v����׊�9iS��O��d@0ڽ���:�p�5�h-��t�&���X�q�ӕ,��ie�|���7A�2���O%P��E��htj��Y1��w�Ѓ!����  ���� ࢽ��My�7�\�a�@�ţ�J �4�Ȼ�F�@o�̒?4�wx��)��]�P��~�����u�����5�����7X ��9��^ܩ�U;Iꭆ 5 �������eK2�7(�{|��Y׎ �V��\"���Z�1� Z�����}��(�Ǝ"�1S���_�vE30>���p;� ΝD��%x�W�?W?v����o�^V�i�d��r[��/&>�~`�9Wh��y�;���R��� ;;ɮT��?����r$�g1�K����A��C��c��K��l:�'��3 c�ﳯ*"t8�~l��)���m��+U,z��`(�>yJ�?����h>��]��v��ЍG*�{`��;y]��I�T� ;c��NU�fo¾h���/$���|NS���1�S�"�H��V���T���4��uhǜ�]�v;���5�͠x��'C\�SBpl���h}�N����� A�Bx���%��ޭ�l��/����T��w�ʽ]D�=����K���ž�r㻠l4�S�O?=�k �M:� ��c�C�a�#ha���)�ѐxc�s���gP�iG��{+���x���Q���I= �� z��ԫ+ �8"�k�ñ�j=|����c ��y��CF��/��*9ж�h{ �?4�o� ��k�m�Q�N�x��;�Y��4膚�a�w?�6�>e]�����Q�r�:����g�,i"�����ԩA�*M�<�G��b�if��l^M��5� �Ҩ�{����6J��ZJ�����P�*�����Y���ݛu�_4�9�I8�7���������,^ToR���m4�H��?�N�S�ѕw��/S��甍�@�9H�S�T��t�ƻ���ʒU��*{Xs�@����f�����֒Li�K{H�w^���������Ϥm�tq���s� ���ք��f:��o~s��g�r��ט� �S�ѱC�e]�x���a��) ���(b-$(�j>�7q�B?ӕ�F��hV25r[7 Y� }L�R��}����*sg+��x�r�2�U=�*'WS��ZDW]�WǞ�<��叓���{�$�9Ou4��y�90-�1�'*D`�c�^o?(�9��u���ݐ��'PI&� f�Jݮ�������:wS����jfP1F:X �H�9dԯ���˝[�_54 �}*;@�ܨ�� ð�yn�T���?�ןd�#���4rG�ͨ��H�1�|-#���Mr�S3��G�3�����)�.᧏3v�z֑��r����$G"�`j �1t��x0<Ɔ�Wh6�y�6��,œ�Ga��gA����y��b��)��h�D��ß�_�m��ü �gG;��e�v��ݝ�nQ� ��C����-�*��o���y�a��M��I�>�<���]obD��"�:���G�A��-\%LT�8���c�)��+y76���o�Q�#*{�(F�⽕�y����=���rW�\p���۩�c���A���^e6��K������ʐ�cVf5$�'->���ՉN"���F�"�UQ@�f��Gb~��#�&�M=��8�ט�JNu9��D��[̤�s�o�~������ G��9T�tW^g5y$b��Y'��س�Ǵ�=��U-2 #�MC�t(�i� �lj�@Q 5�̣i�*�O����s�x�K�f��}\��M{E�V�{�υ��Ƈ�����);�H����I��fe�Lȣr�2��>��W�I�Ȃ6������i��k�� �5�YOxȺ����>��Y�f5'��|��H+��98pj�n�.O�y�������jY��~��i�w'������l�;�s�2��Y��:'lg�ꥴ)o#'Sa�a�K��Z� �m��}�`169�n���"���x��I ��*+� }F<��cГ���F�P�������ֹ*�PqX�x۩��,� ��N�� �4<-����%����:��7����W���u�`����� $�?�I��&����o��o��`v�>��P��"��l���4��5'�Z�gE���8���?��[�X�7(��.Q�-��*���ތL@̲����v��.5���[��=�t\+�CNܛ��,g�SQnH����}*F�G16���&:�t��4ُ"A��̣��$�b �|����#rs��a�����T�� ]�<�j��BS�('$�ɻ� �wP;�/�n��?�ݜ��x�F��yUn�~mL*-�������Xf�wd^�a�}��f�,=t�׵i�.2/wpN�Ep8�OР���•��R�FJ� 55TZ��T �ɭ�<��]��/�0�r�@�f��V��V����Nz�G��^���7hZi����k��3�,kN�e|�vg�1{9]_i��X5y7� 8e]�U����'�-2,���e"����]ot�I��Y_��n�(JҼ��1�O ]bXc���Nu�No��pS���Q_���_�?i�~�x h5d'�(qw52] ��'ޤ�q��o1�R!���`ywy�A4u���h<קy���\[~�4�\ X�Wt/� 6�����n�F�a8��f���z �3$�t(���q��q�x��^�XWeN'p<-v�!�{�(>ӽDP7��ո0�y)�e$ٕv�Ih'Q�EA�m*�H��RI��=:��� ���4牢) �%_iN�ݧ�l]� �Nt���G��H�L��� ɱ�g<���1V�,�J~�ٹ�"K��Q�� 9�HS�9�?@��k����r�;we݁�]I�!{ �@�G�[�"��`���J:�n]�{�cA�E����V��ʆ���#��U9�6����j�#Y�m\��q�e4h�B�7��C�������d<�?J����1g:ٳ���=Y���D�p�ц� ׈ǔ��1�]26؜oS�'��9�V�FVu�P�h�9�xc�oq�X��p�o�5��Ա5$�9W�V(�[Ak�aY錎qf;�'�[�|���b�6�Ck��)��#a#a˙��8���=äh�4��2��C��4tm^ �n'c���]GQ$[Wҿ��i���vN�{Fu ��1�gx��1┷���N�m��{j-,��x�� Ūm�ЧS�[�s���Gna���䑴�� x�p 8<������97�Q���ϴ�v�aϚG��Rt�Һ׈�f^\r��WH�JU�7Z���y)�vg=����n��4�_)y��D'y�6�]�c�5̪�\� �PF�k����&�c;��cq�$~T�7j ���nç]�<�g ":�to�t}�159�<�/�8������m�b�K#g'I'.W�����6��I/��>v��\�MN��g���m�A�yQL�4u�Lj�j9��#44�t��l^�}L����n��R��!��t��±]��r��h6ٍ>�yҏ�N��fU�� ���� Fm@�8}�/u��jb9������he:A�y�ծw��GpΧh�5����l}�3p468��)U��d��c����;Us/�֔�YX�1�O2��uq�s��`hwg�r~�{ R��mhN��؎*q 42�*th��>�#���E����#��Hv�O����q�}�����6�e��\�,Wk�#���X��b>��p}�դ��3���T5��†��6��[��@�P�y*n��|'f�֧>�lư΂�̺����SU�'*�q�p�_S�����M�� '��c�6�����m�� ySʨ;M��r���Ƌ�m�Kxo,���Gm�P��A�G�:��i��w�9�}M(�^�V��$ǒ�ѽ�9���|���� �a����J�SQ�a���r�B;����}���ٻ֢�2�%U���c�#�g���N�a�ݕ�'�v�[�OY'��3L�3�;,p�]@�S��{ls��X�'���c�jw�k'a�.��}�}&�� �dP�*�bK=ɍ!����;3n�gΊU�ߴmt�'*{,=SzfD� A��ko~�G�aoq�_mi}#�m�������P�Xhύ����mxǍ�΂���巿zf��Q���c���|kc�����?���W��Y�$���_Lv����l߶��c���`?����l�j�ݲˏ!V��6����U�Ђ(A���4y)H���p�Z_�x��>���e��R��$�/�`^'3qˏ�-&Q�=?��CFVR �D�fV�9��{�8g�������n�h�(P"��6�[�D���< E�����~0<@�`�G�6����Hг�cc�� �c�K.5��D��d�B���`?�XQ��2��ٿyqo&+�1^� DW�0�ꊩ���G�#��Q�nL3��c���������/��x ��1�1[y�x�პCW��C�c�UĨ80�m�e�4.{�m��u���I=��f�����0QRls9���f���������9���~f�����Ǩ��a�"@�8���ȁ�Q����#c�ic������G��$���G���r/$W�(��W���V�"��m�7�[m�A�m����bo��D� j����۳� l���^�k�h׽����� ��#� iXn�v��eT�k�a�^Y�4�BN��ĕ��0 !01@Q"2AaPq3BR������?���@4�Q�����T3,���㺠�W�[=JK�Ϟ���2�r^7��vc�:�9 �E�ߴ�w�S#d���Ix��u��:��Hp��9E!�� V 2;73|F��9Y���*ʬ�F��D����u&���y؟��^EA��A��(ɩ���^��GV:ݜDy�`��Jr29ܾ�㝉��[���E;Fzx��YG��U�e�Y�C���� ����v-tx����I�sם�Ę�q��Eb�+P\ :>�i�C'�;�����k|z�رn�y]�#ǿb��Q��������w�����(�r|ӹs��[�D��2v-%��@;�8<a���[\o[ϧw��I!��*0�krs)�[�J9^��ʜ��p1)� "��/_>��o��<1����A�E�y^�C��`�x1'ܣn�p��s`l���fQ��):�l����b>�Me�jH^?�kl3(�z:���1ŠK&?Q�~�{�ٺ�h�y���/�[��V�|6��}�KbX����mn[-��7�5q�94�������dm���c^���h� X��5��<�eޘ>G���-�}�دB�ޟ� ��|�rt�M��V+�]�c?�-#ڛ��^ǂ}���Lkr���O��u�>�-D�ry� D?:ޞ�U��ǜ�7�V��?瓮�"�#���r��չģVR;�n���/_� ؉v�ݶe5d�b9��/O��009�G���5n�W����JpA�*�r9�>�1��.[t���s�F���nQ� V 77R�]�ɫ8����_0<՜�IF�u(v��4��F�k�3��E)��N:��yڮe��P�`�1}�$WS��J�SQ�N�j�ٺ��޵�#l���ј(�5=��5�lǏmoW�v-�1����v,W�mn��߀$x�<����v�j(����c]��@#��1������Ǔ���o'��u+����;G�#�޸��v-lη��/(`i⣍Pm^���ԯ̾9Z��F��������n��1��� ��]�[��)�'������:�֪�W��FC����� �B9،!?���]��V��A�Վ�M��b�w��G F>_DȬ0¤�#�QR�[V��kz���m�w�"��9ZG�7'[��=�Q����j8R?�zf�\a�=��O�U����*oB�A�|G���2�54 �p��.w7� �� ��&������ξxGHp� B%��$g�����t�Џ򤵍z���HN�u�Я�-�'4��0��;_��3 !01"@AQa2Pq#3BR������?��ʩca��en��^��8���<�u#��m*08r��y�N"�<�Ѳ0��@\�p��� �����Kv�D��J8�Fҽ� �f�Y��-m�ybX�NP����}�!*8t(�OqѢ��Q�wW�K��ZD��Δ^e��!� ��B�K��p~�����e*l}z#9ң�k���q#�Ft�o��S�R����-�w�!�S���Ӥß|M�l޶V��!eˈ�8Y���c�ЮM2��tk���� ������J�fS����Ö*i/2�����n]�k�\���|4yX�8��U�P.���Ы[���l��@"�t�<������5�lF���vU�����W��W��;�b�cД^6[#7@vU�xgZv��F�6��Q,K�v��� �+Ъ��n��Ǣ��Ft���8��0��c�@�!�Zq s�v�t�;#](B��-�nῃ~���3g������5�J�%���O������n�kB�ĺ�.r��+���#�N$?�q�/�s�6��p��a����a��J/��M�8��6�ܰ"�*������ɗud"\w���aT(����[��F��U՛����RT�b���n�*��6���O��SJ�.�ij<�v�MT��R\c��5l�sZB>F��<7�;EA��{��E���Ö��1U/�#��d1�a�n.1ě����0�ʾR�h��|�R��Ao�3�m3 ��%�� ���28Q� ��y��φ���H�To�7�lW>����#i`�q���c����a��� �m,B�-j����݋�'mR1Ήt�>��V��p���s�0IbI�C.���1R�ea�����]H�6����������4B>��o��](��$B���m�����a�!=��?�B� K�Ǿ+�Ծ"�n���K��*��+��[T#�{E�J�S����Q�����s�5�:�U�\wĐ�f�3����܆&�)����I���Ԇw��E T�lrTf6Q|R�h:��[K�� �z��c֧�G�C��%\��_�a�84��HcO�bi��ؖV��7H �)*ģK~Xhչ0��4?�0��� �E<���}3���#���u�?�� ��|g�S�6ꊤ�|�I#Hڛ� �ա��w�X��9��7���Ŀ%�SL��y6č��|�F�a 8���b��$�sק�h���b9RAu7�˨p�Č�_\*w��묦��F ����4D~�f����|(�"m���NK��i�S�>�$d7SlA��/�²����SL��|6N�}���S�˯���g��]6��; �#�.��<���q'Q�1|KQ$�����񛩶"�$r�b:���N8�w@��8$�� �AjfG|~�9F ���Y��ʺ��Bwؒ������M:I岎�G��`s�YV5����6��A �b:�W���G�q%l�����F��H���7�������Fsv7��k�� 403WebShell
403Webshell
Server IP : 172.67.215.126  /  Your IP : 172.69.214.218
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux ip-172-31-19-221 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64
User : www-data ( 33)
PHP Version : 8.1.28
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /efsdata/scitechnol.com/httpdocs/submission/uploads/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /efsdata/scitechnol.com/httpdocs/submission/uploads/656-0-Manuscript-2013-05-12.doc
��ࡱ�>��	������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������	��0PSbjbj���	ɚ�����Jj�������88{{   4����G G G G �!\G t��g!��!�!�!�!.$� %d�%4�������������$X����:� �%�#^.$�%�%�{{�!�!�.��,�,�,�%P{l�! �!��,�%��,�,
���,%��!������J�&��G (4��PߠD�0t�E��4�<+`4��%�%�^4� ��\�%�%�,�%�%�%�%�%���,�%�%�%t��%�%�%�%��������������������������������������������������������������������4��%�%�%�%�%�%�%�%�%8	A:	 Data base Access Control
A look at Fine grain Access method
Done by: Elham  Iskandarnia

Abstract                                           
Many wide issues including  legal and ethical ,or issues related to government policies, corporate issues and government issues  are included in Database security.
Threat is a condition  or event, whether it is  deliberate or unintended, that may harmfully affect the system and as result harm the organization. a person or action he take or any circumstance can be the reason  for treats The harm can be classified as 
Tangible, such as defeat of  data or hardware or  software. 
Intangible, like when you lose client trusts .
 A  treat may cause on  the loss or filth of all  or some  of commonly accepted security goals like  integrity, availability ,and confidentiality.
There are four kind of control measurement usually used to keep DB from harms of treats.
Access control
     An unauthorized person  must be proven  from accessing the system so he can not review information or modify them, there are many different access method s that  DBMS use as whole to limit the access to data in DBMS .
Access method handled by creating user accounts and passwords to control the log-in process by the DB.
Interface control
Flow control 
Encryption
In  database system with many user there must be techniques provide by   DBMS so only selected user can access portion of database which they are authorize without giving them access to rest of database.  DB security and authorization subsystem are usually included in DBMS  to guarantee  the security portion of DB. In these paper we will focus on first control, access methods
Keywords: Access Control, FGA, DAC, MAC,VPN

1.Introduction:
The important factors for organization includes time content ,documents  which are consists of time and text. Also the most important properties of DBMS including availability and integrity and methods to achieve these feature are must be considered. That is why  DSC come up with techniques and functions over years to insure data are available and consist and integrated. However,  using of new methos and hardware like clouds computer new computing structure like on demand business and online business make demand of new security methods to be adapted by .
 One of these new techniques are Virtual Private Network Or Mask which allow user access attributes in tables or views which they owne like a doctor can see his paithents record only. These feature introduce in oracle data base 11g is one of the most common .
Virtual Private Database (VPD), a feature of Oracle Database 11g Enterprise Edition, Oracle8i introduced in one of the most popular security features in a database. �VPD is used as the standard object privileges and roles associated with the database is sufficient to meet the security requirements of the software. VPD policies can be simple or complex depending on your security needs. VPD can be combined with the "features" of the program to run a complex row and / or column level security requirements for privacy and regulatory compliance are used. No matter how users connect to protected tables (via a software, a web interface or SQL * Plus), the result is the same. No problem for software security "does not exist, the access policy is attached to the table, and can not be ignored� 2.Review of related literature

 There are many articles published in international journals which discus database security as general and data access methods specially.. In article by Dr. virtual[3]  present a general and extensible methodology for content adaptation based on the generation and management of configurations they also how information has to be delivered by taking into account the requirements of adaptation for the profile.
Dr. Matt Henricksen in his paper[4]  investigates  issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. His  paper discuses the importance of a trusted computing base in providing application security. It describes a secure three-tiered architecture, incorporating trusted hardware, SELinux, and application security mechanisms that are appropriate for securing sensitive application data.
3. Research Problems and Conceptual frame works
In this paper we will answer following Questions
What is data Access methods?
What are different type of data access methods? What are features of each of them?
What is the best Access methods for given situation?



                 Input                                      Process                                    output

                                                       Figure1.IPO chart of research


4.Methadology

Meta Analysis Research methodology is adopted in accomplishing my research goal. The research intends to study the commonly used access  method and its drawbacks, also the additional factor which solves the problems in widely used methodology. The research analyzed various DB which  use the existing access  models . A novel model that avoids negative aspects of the previous methodologies is proposed.


5.Results and Discussion

5.1 Access Control
Granting and revoking of privileges is  common way to give access controls for a database system. A user need  privilege  to create or access (that is read, write, or modify) some database object including relation, view, or index or to run certain DBM utilities, they need privileges to accomplish their jobs tasks. You can compromise security by granting    unnecessary privileges:  the user must get a privilege when it is necessary to him in order to do  his job. A creatore of the object have full access to that objects so if HR create a view called EMPLOYEES he has the full accesss control for Emplyess. �The DBMS subsequently keep track of how these privileges are granted to other users, and possibly revoked, and ensure that at all times only users with necessary privileges can access an object. �
5.1.1Discretionary Access Control (DAC) 
To manage privileges organization usually used an approach in SQL  called called �Discretionary Access Control (DAC)�. GRANT and REVOKE command  are the way that  SQL standard supports DAC. To give privileges to user you use GRANT and to take privileges back you used REVOKE.
In SQL, when we talk about revoke or grant we talk about the user account or group of user account .so each account of group have access to some relation in DB there are to way of granting right: 
 The account level: �At this level,  the privilege is granted to accounts without considering objects �CREATE SCHEMA or CREATE TABLE CREATE VIEW privilege; the ALTER and DROP� . �
The relation (or table) level. At this level,  the privilege for each relation is granting separately by the DBA and  the relation can be virtual(view),some privilege can also be grant to attribute of database  
 Even DAC is effective but it has some weakness ,to solve this weakness we use a approach in dB called  Mandatory Access Control (MAC)
5.1.2 Mandatory Access Control (MAC)
� is based on system-wide policies that cannot be changed by individual users. In this approach each database object is assigned a security class and each user is assigned a clearance for a security class, and rules are imposed on reading and writing of database objects by users. The DBMS determines whether a given user can read or write a given object based on certain rules that involve the security level of the object and the clearance of the user. These rules seek to ensure that sensitive data can never be passed on to another user without the necessary clearance. In order to apply mandatory access control policies in a relational DBMS, a security class must be assigned to each database object. The objects can be at the granularity of relations, tuples, or even individual attribute values. Assume that each tuple is assigned a security class. This situation leads to the concept of a multilevel relation, which is a relation that reveals different tuples to users with different security clearances.�
5.1.2.1 Difference and common feature of   Discretionary Access Control and Mandatory Access Control 
Discretionary Access Control (DAC) policies are very  flexibility, so they can used in many different  domains. The basic weak point of  DAC models is their vulnerability to malicious attacks, such as Trojan horses embedded in application programs. Because as user authorized for getting information get information these method does not have any control  how they used information. But MAC ,  block any illegal  communication of data. Therefore, they are suitable for military types of applications, which require a high degree of protection. But because of their complicate structure they cannot widely used in many system.  So in many situation in business DAC is preferred
 5.1.3  Role-Based Access Control 
In these system right are given to roles and role are assign in user. RBAC was widely used in early 1990 when security come a major issues in large scale enterprises. CREATE ROLE and DESTROY ROLE are the commend to mange roles then you can use grand and revoke to give rights to role
RBAC is potentially  possible choice  to DAC and MAC. Many DBMS adpted the concept called role used by oracle so roles can have difference  privileges .

�Role hierarchy in RBAC is a natural way to organize roles to reflect the organization's lines of authority and responsibility. By convention, junior roles at the bottom are connected to progressively senior roles as one moves up the hierarchy. The hierarchic diagrams are partial orders, so they are reflexive, transitive, and antisymmetric. 
Another important consideration in RBAC systems is the possible temporal constraints that may exist on roles, such as the time and duration of role activations, and timed triggering of a role by an activation of another role. Using an RBAC model is a highly desirable goal for addressing the key security requirements of Web-based applications. Roles can be assigned to workflow tasks so that a user with any of the roles related to a task may be authorized to execute it and may play certain role for a certain duration only. �
The advantage of  RBAC model is  flexibility, policy neutrality, better support for security management and administration, and other aspects that make them attractive candidates for developing secure Web-based applications. 
5.2 Row Level Access Control
To store data from different department or even for a host company in database Oracle before used trigger or view but today this will be done by the row level security concept 
�If an application needed to cater to a number of departments that should only be able to access differing sets of data then a set of views would be created for each group of business users. These would have hard coded where clauses that implemented the business rules. Instead, database triggers would be utilized to cater for data manipulations. Grouping business users together to be able to use these sets of views and triggers tended to lead to the use of shared accounts.�
Feature of Row level Access method
For Application which need big number of user access same data but each one has different level of access is one of the best methods..
Since one procedure per table  is doing  implementation the maintenance becomes easier 
It should be possible to retro-fit row level security to an existing application due to the fact that it is implemented on the server as close to the actual data as possible.
It can control loophole of data access because row level security is performe very near to database .
By oracle feature auditor can run their job  much easier 
Virtual tables as well as table can have  can have security policies

Application are more manageable by row level security because of easy design and less code.
5.3 Fine Grained Access control
Oracle is providing a new row level security refer to it as FGA,this  security can be implement to allow user to view only some column in table od department which they are working on it. Oracle use to methods for FGA
application context
fined-grained access control policy
for referring to  implementation of  fist methods oracle uses the term  virtual private database (VPD) to call to the execution of fine-grained access-control policies using application context.
FGA can be used for: 
Impose RLAC by �select, insert, update and delete �statements
 Check access to certain values on a attribute in your relation
�

You will be enabled to make application that must used security policies at row level by use of FGA you refer to these policies as VPD policies. they can be used to limit customer to see only their own  account in DB . A doctor can be restricted  seeing only the records of her own patients. Attaching and including security policy to objects of database enforce row-level,  so whatever is your way to access the object you cannot this method ensures that whatever way you access the object you cannot avoid  security. Oracle does this is to add where to query  to  limit the row . 
By FGA you attached the function of security to your relation or view on which your application use ,when user inter DML or select command  transparent to him oracle modified the statement, also you can use security on index  to perform with �CREATE INDEX and ALTER INDEX�.
5.3.1 Features of Fine-Grained Access Control
�Fine-grained access control provides the following capabilities:
HYPERLINK "http://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm" \l "i1008336"Security Policies Based on Tables, Views, and Synonyms
HYPERLINK "http://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm" \l "i1008351"Multiple Policies for Each Table, View, or Synonym
HYPERLINK "http://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm" \l "i1008356"Grouping of Security Policies
HYPERLINK "http://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm" \l "i1008361"High Performance
HYPERLINK "http://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm" \l "i1008365"Default Security Policies�

We will discuss each one in detailed
Security Policies Based on Tables, Views, and Synonyms
This  provide better flexibility, security and simplicity




Security
You can solve a majore application problem with attaching  a policy with a objects,. By attaching security policies to objects , FGA guaranty regardless of method user access data same security enforced
Simplicity
You add security once to objects  not many times to many application which are using that objects 
Flexibility
You can have  different policies for each one of your DML commends like SELECT,DELETE ,
Multiple Policies for Each OBJECTS 
You can create numerous policies for the same table, view, or synonym. I.e. if you have a base application for Order Entry and each division of your company have its own distinct procedures for data access. You can add a division-specific policy function to a table without changing the policy function of the base application.
Note that all policies applied to a table are imposed by AND syntax
Grouping of Security Policies
One table can have multiple policies link to it and also many application can access same table so it is important to define which policy is using when accessing object policies.
High Performance
The policy in these metods is evaluating only one time in time of statement parsing. Also, parsed statements can be reused and shred and the whole  dynamically modified query is optimized so it can use of feature like dictionary caching and shared cursors  which are high performance .
Default Security Policies
�While partitioning security policies by application is desirable, it is also useful to have security policies that are always in effect. In the previous example, a hosted application can always enforce data separation by subscriber_ID, whether you are using the Human Resources application or the Finance application. Default security policies allow developers to have base security enforcement under all conditions, while partitioning of security policies by application (using security groups) enables layering of additional, application-specific security on top of default security policies. To implement default security policies, you add the policy to the SYS_DEFAULT
Policy group�


5.3.3 Implementation of FGA 
First you have to create policy and embedded it to table lets look at command line of these 
 Suppose you define a policy and  want customer only see their order in ORDER_tab table  Create a function to add a predicate to a DML statement run by a user.
In this case, you might create a code  that adds the following predicate:
�Cust_no = (SELECT Custno FROM Customers WHERE Custname = 
            SYS_CONTEXT ('userenv','session_user')) �
�A user enters the following statement:
SELECT * FROM Orders_tab;
The Oracle Database server calls the function you created to implement the security policy.
The function dynamically modifies the statement entered by the user to read as follows:
SELECT * FROM Orders_tab WHERE Custno = (
   SELECT Custno FROM Customers 
       WHERE Custname = SYS_CONTEXT('userenv', 'session_user'))�
�The Oracle Database server runs the dynamically modified statement.
Upon execution, the function employs the user name returned by SYS_CONTEXT�('userenv','session_user')�to look up the corresponding customer and to limit the data returned from the ORDERS_TAB table to that associated with that particular customer only.�

6. Conclusion and Recommendation :
In this article we discuses about different access methods that can be used in database system. As mentioned in article not any of these methods can be picked as the best methods to control access to information in database .Database Administratore is responsible to analyze evaluate the database base circumstance and select the best methods that can be answer the security requirement of database as well as be easy to implement and flexible in different condition

7. References:
�1. HYPERLINK "http://www.find-book.co.uk/book/Oracle-Database-11g-The-Complete-Reference/0071598758.htm" Oracle Database 11g The Complete Reference (Osborne Oracle Press Series) by Kevin Loney McGraw-Hill Osborne Hardcover 1 January 2009 �
�2. HYPERLINK "http://www.find-book.co.uk/book/Beginning-Oracle-Programming/186100690X.htm"Beginning Oracle Programming by Sean Dillon,Christopher Beck,Thomas Kyte,Joel Kallman,Howard Rogers WROX Press Ltd Paperback 20 March 2002
3. A general methodology for context-aware data access �Roberto Virtualo- university of Rome
4. Securing grid data using mandatory access controls- University of Technology �Brisbane ,Australia �Dr . Matt Henricksen

3.� HYPERLINK "http://www.find-book.co.uk/book/Expert-Oracle-Database-Architecture-Oracle-Database-Programming-9i-10g-and-11g-Techniques-and-Solutions-2nd-Edition/1430229462.htm"Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions 2nd Edition �
4.4
User has rights to access data in DB,

Processing of situation

Suggesting the best data access methods



FGLM\d���!	&	3	4	J	\	c	d	n	r	|	�	�	�	
������ᮝ���p�pfYfYLYLYLYfh�0#h-OJQJ^Jh�0#hU3_OJQJ^Jh-OJQJ^J h�0#h�9�CJOJQJ^JaJh�N-CJOJQJ^JaJh�s�CJOJQJ^JaJ h�0#hUyCJOJQJ^JaJ h�0#hF|�CJOJQJ^JaJ h�0#h6m�CJOJQJ^JaJ h�0#h�&JCJOJQJ^JaJ h�0#h#�CJOJQJ^JaJhF|�CJ OJQJ^JaJ >Z[\�4	4
r
�
4������������$�*��^�*a$gd�s�m$p$$
&F#��a$gd%vFm$p$$�Z��^�Za$gd%vFm$p$�L�d��P7$8$H$^�L�gd�N-m$p$d��7$8$H$gd#�m$p$$d��1$7$8$H$a$gd#�m$p$d��7$8$H$gd#�

5
G
M
Q
Z
b
f
o
p
q
s
~
�
�
�
�
�
�
�
�
�
�
�
�
234����BHy�����������������������������ŷ����v�h�h�h%vFCJOJQJ^JaJ h�0#hUyCJOJQJ^JaJh�N-CJOJQJ^JaJ h�0#hN7�CJOJQJ^JaJ h�0#hg([CJOJQJ^JaJh�s�CJOJQJ^JaJh�0#hg([OJQJ^Jh%vFOJQJ^Jh�0#h%vFOJQJ^Jh�s�OJQJ^Jh�0#hU3_OJQJ^J(4��{��


������67�����������������	d��gd�x	d��gd
q7�L�d��P7$8$H$^�L�gd�N-m$p$�L�d��P7$8$H$^�L�gd%vFm$p$
&F�L��d��P7$8$H$^�L�`�gd#�p$�L�d��P7$8$H$^�L�gd#�m$p$���


U
Z
�
�
#-I�������9��ͼ���N�����xj\K�;h
q7CJOJPJQJ^JaJ h�x5�CJOJQJ\�^JaJhY/CJOJQJ^JaJhF|�CJOJQJ^JaJ h�0#hF|�CJOJQJ^JaJ&h�0#hF|�5�CJOJQJ\�^JaJ h�0#h&'
CJOJQJ^JaJh�N-CJOJQJ^JaJ h�0#h�9�CJOJQJ^JaJ h�0#hg([CJOJQJ^JaJ h�0#hN7�CJOJQJ^JaJ h�0#hUyCJOJQJ^JaJ9D7�����
568���������t^K8K$h�N-5�CJOJPJQJ\�^JaJ$h�x5�CJOJPJQJ\�^JaJ*h�xh�x5�CJOJPJQJ\�^JaJ5h�N-h�N-CJOJPJQJ^JaJfHq�
����-h��h�N-B*CJOJPJQJ^JaJph���h�xCJOJPJQJ^JaJ-h��h��B*CJOJPJQJ^JaJph���h��CJOJPJQJ^JaJh
q7CJOJPJQJ^JaJ$h�N-h�N-CJOJPJQJ^JaJ8�������������������\]�����������������~p���_N_ h#�5�CJOJQJ\�^JaJ h�*25�CJOJQJ\�^JaJjh�>�UmHnHujh�*2UmHnHuh�>�h�>�h�x5�\�h�>�5�\�h�xh�>�'h�>�h�>�0J5�B*CJ\�aJph!h�>�0J5�B*CJ\�aJphh�xCJOJQJ^JaJ h�xh�xCJOJQJ^JaJ$h�xh�xCJOJPJQJ^JaJ��Da�����]^�����XYZ��������������������L�d��P7$8$H$^�L�gd�*2m$p$�L�d��P7$8$H$^�L�gd#�m$p$d��<�<gd#�m$p$	d��gd�x��^��gd�>�
&F%gd�>�gd�>�������Efgh���������JWXZstx�������ͼ�����������������������vl_lh�0#h+E�OJQJ^Jh+E�OJQJ^J&h�*2hKV�5�CJOJQJ\�^JaJh�*2B*OJQJph"""h2kph�*2B*OJQJph"""h2kph�*2OJQJh�*2h�*2OJQJ\� h�*25�CJOJQJ\�^JaJ&h�*2h�*25�CJOJQJ\�^JaJ h�*2h�*2CJOJQJ^JaJh�*2CJOJQJ^JaJ Zst���� �!i"=#�#�#�'���������p���L�d��P^�L�gd_ lm$p$�3�L��P]�3^�L�gd_ lm$p$�3�L��P]�3^�L�gd��m$p$�L�d��P^�L�gd_ lm$p$�L�d��P^�L�gdGTm$p$
�L��P^�L�gd��m$p$�L�d��P7$8$H$^�L�gd#�m$p$�L�d��P7$8$H$^�L�gd�*2m$p$��������KUmn�����������	\]�����������������������������Ÿ������l\hGThKV�5�OJQJ\�^J$hGThKV�5�6�OJQJ\�]�^Jh�*25�6�OJQJ\�]�^JhKV�B*OJQJ^Jph���!hS�hS�B*OJQJ^Jph���h��OJQJ^Jh�0#hS�OJQJ^JhS�hS�OJQJ^JhS�OJQJ^Jh�0#h+E�OJQJ^Jh+E�OJQJ^Jh�0#hKV�OJQJ^J#��& - . P Q S l ~  � � � � � �!�!�!�!�!�!�!�!""9"������ٻ�����٪����ra�WaJh�0#h_ lOJQJ^Jh��OJQJ^J!h_ lh_ lB*OJQJ^Jph���h�0#h&'
OJQJ^JhGTh]r96�OJQJ]�^Jh�0#h]r9OJQJ^JhGTCJOJQJ^JaJ h�0#h]r9CJOJQJ^JaJh�0#hGTOJQJ^J!hGThGTB*OJQJ^Jph���h�0#hKV�OJQJ^JhGTOJQJ^JhGThGT5�OJQJ\�^J9":"Z"c"d"e"g"h"i"�"�"�"�";#=#�#�#�#�#�#�#l${$�$�$����ܾ˾��ܾܾܡ�y�dS?S?&h�0#hKV�6�CJOJQJ]�^JaJ h�0#hKV�CJOJQJ^JaJ)h_ lh_ lB*CJOJQJ^JaJph���&h�*2hKV�5�CJOJQJ\�^JaJ&h�*2h�*25�CJOJQJ\�^JaJh�0#hKV�OJQJ^JhGTh]r96�OJQJ]�^Jh�0#h]r9OJQJ^J!h_ lh_ lB*OJQJ^Jph���h_ lOJQJ^Jh�0#h_ lOJQJ^Jh_ lh_ lOJQJ^J�$�$�$�'�'�'�'
((()(I(y(~(�(�(�(�()B)�)�)�)�)�)i*�*�*�*�*�*����﹬���uuuhuhuhuhuhuhXh�*2h�*25�OJQJ\�^Jh�0#h�x�OJQJ^Jh[]�OJQJ^Jh�0#h]r9OJQJ^Jh�0#h�x�5�OJQJ\�^Jh�0#h]r95�OJQJ\�^Jh��5�OJQJ\�^Jh�*25�OJQJ\�^J)h_ lh_ lB*CJOJQJ^JaJph���&h�0#hKV�6�CJOJQJ]�^JaJ h�0#hKV�CJOJQJ^JaJ�'I(�*+-,�,�,".50141�1�3�3�������������d���gd#�m$p$d���gdH�m$p$
�L��P^�L�gd#�m$p$
�L��P^�L�gdH�m$p$
�L��P^�L�gdH�m$p$gd��
�L��P^�L�gd��m$p$gd[]�
�L��P^�L�gd[]�m$p$
�L��P^�L�gd#�m$p$
�*+�+�+�+�+,,-,.,2,A,B,J,K,R,V,a,l,�,�,�,�,�,�,304050U01131����Ⱦ������������������q���dTh�0#h�d5�OJQJ\�^Jh�*25�OJQJ\�^J!hH�hH�B*OJQJ^Jph���h��h��h�x�OJQJ^Jh�0#h��OJQJ^Jh��OJQJ^Jh�0#h�x�OJQJ^Jh[]�h[]�hH�OJQJ^Jh[]�OJQJ^Jh�0#h[]�OJQJ^Jh[]�h[]�OJQJ^Jh[]�h�*2h�x�5�OJQJ\�^J3141�1�1�1�1�2�2�3�3�3�3�3l4n4s4��ɶ������s]M�:$h�`�hH�CJOJPJQJ^JaJhH�CJOJPJQJ^JaJ*h�0#h�Pu5�CJOJPJQJ\�^JaJ*h�0#h�d5�CJOJPJQJ\�^JaJ*h�0#h�Pu6�CJOJPJQJ]�^JaJ-hH�hH�B*CJOJPJQJ^JaJph���$h�0#h�PuCJOJPJQJ^JaJ(h�0#h�dCJOJQJ^JaJmH	sH	"hH�CJOJQJ^JaJmH	sH	h�0#h�x�5�OJQJ\�^J�3n4�4u5�56Z6[6�6�6�7��������f$�Zd��d�d[$\$^�Za$gd8F>m$p$��d��d�d[$\$^��gd#�m$p$��d��d�d[$\$^��gd�`�m$p$
&Fd��d�d[$\$gd�`�m$p$
&Fd��d�d[$\$gd&Vm$p$
&Fd��d�d[$\$gd#�m$p$
&Fd��d�d[$\$gdH�m$p$
s4�4�4�4t5u5�5�5�5�566Y6Z6[6�6�6�6�6�6���Ǵ����턤q���^H5$h�d5�CJOJPJQJ\�^JaJ*h�0#h�d5�CJOJPJQJ\�^JaJ$h�*25�CJOJPJQJ\�^JaJ$h�0#h�`�CJOJPJQJ^JaJh�PuCJOJPJQJ^JaJh&VCJOJPJQJ^JaJh�`�CJOJPJQJ^JaJ$h�0#h�PuCJOJPJQJ^JaJ$h�`�h�PuCJOJPJQJ^JaJ$h�`�hH�CJOJPJQJ^JaJ$h�`�h�`�CJOJPJQJ^JaJ�6�6�7�7�708S8W8_8h8�8�8�8�8�8�8�8�8�8A9C9�9�9����ݷ������n[n[�[�[M< h�0#h�dCJOJQJ^JaJh8F>CJOJQJ^JaJ$h�0#h8F>CJOJPJQJ^JaJ*h�0#h8F>6�CJOJPJQJ]�^JaJh�=�CJOJPJQJ^JaJ$h�0#hxCJOJPJQJ^JaJhxCJOJPJQJ^JaJ$h�0#h�=�CJOJPJQJ^JaJ$h8F>h�=�CJOJPJQJ^JaJh8F>CJOJPJQJ^JaJ$h8F>h8F>CJOJPJQJ^JaJ�7�7�7�8�89@9B9C9�;�<�<=�=������������x
&Fgd#�m$p$gd#�m$p$gd#�m$p$gd4&�m$p$d��d�d[$\$gd�
m$p$d��d�d[$\$gd8F>m$p$�Z�Zd��d�d[$\$^�Z`�Zgd8F>m$p$d��d�d[$\$gdxm$p$
&F$d��d�d[$\$gd8F>p$
�9::: :9:::;:F:e:f:�:�:�:9;?;Z;t;u;x;y;~;�;�;�;�;�;�;�;o<v<}<�����������������}���l�hdhdhh�J�h4&� h�0#hY�CJOJQJ^JaJhv�CJOJPJQJ^JaJh�
CJOJPJQJ^JaJ$h�0#h�=�CJOJPJQJ^JaJhxCJOJPJQJ^JaJ$h�0#h�dCJOJPJQJ^JaJhv�CJOJQJ^JaJ h�0#h�dCJOJQJ^JaJh:+�CJOJQJ^JaJ}<�<�<�<�<�<�<�<�<=
=j=k=�=�=�=�=>>4>5>6>7>�>�>�>�>�>�>??#?$?%?&?�?�?�?�?�?�?�?�����Ⱥ���������������������������������{h�*2h�*2B*phh�*2hY�h�0#hY�0J>*B*ph�hC`�jhC`�Uh�0#hY�h4&�h4&�B*ph���h�*2hY�6�CJ]�aJh�*2h�*26�CJ]�aJh4&�0J&CJOJQJ^JaJh�0#h4&�$h�0#h4&�0J&CJOJQJ^JaJ)�=6>�>%?�?�?�?�?7@8@9@:@;@D@AA}A�A�ABMC��������������������gd(�m$p$
d�gd�8�m$p$gd�8�m$p$
d�gd�:bm$p$gd4&�m$p$
d�gd�:bm$p$���^���gd�*2m$p$
&Fgd#�m$p$�?�?@@6@7@;@D@R@~@�@�@�@�@�@AAA|A}A�A�A�A�A�ABBMC�C�C�C�����Ʋ�׮׮׮ײ�ײ׮ח��yeOe*h
zh(�0J&5�CJOJQJ\�^JaJ&h
zh(�5�CJOJQJ\�^JaJh(�h(�,h(�h�8�5�6�CJOJQJ\�]�^JaJ,h(�hY�5�6�CJOJQJ\�]�^JaJh�8�&h�0#hY�5�CJOJQJ\�^JaJ h�*25�CJOJQJ\�^JaJh�0#hY�h�0#h4&�h4&�,h�*2hY�5�6�CJOJQJ\�]�^JaJMC�C�CbDsD�E�EMH[H\H]HzH�HwI�I�I2JZJtJ������������������)
&F
��gd�:bm$p$��^��gd�:bm$p$)��^��gd�:bm$p$��^��gd-m$p$gd-m$p$gd�:bm$p$
d�gd�:bm$p$gd(�m$p$
d�gd(�m$p$�C�C`DaDbDsD�D�DE/E�E�E�E�E�E�F�FAHLHYHZH[H����»�����֘��z�zgP9-h�7Oh*bR0J&B*CJOJQJ^JaJph���-h�7Oh(�0J&B*CJOJQJ^JaJph���$h(�h*bR0J&CJOJQJ^JaJ$h(�hY�0J&CJOJQJ^JaJh�7Oh(�B*ph���&h(�hY�5�CJOJQJ\�^JaJh(�B*ph�h(�hY�h(�h(�&h�0#hY�5�CJOJQJ\�^JaJhZ*�hY�B*ph�h(�h�8�,h
zhY�5�6�CJOJQJ\�]�^JaJ[HcHyHzH�H�H/I�I�I�I�I0J1J2J3JZJtJ(K�K�K�K�K8L^L�L�L�L�L�L�L�L�������������������x�e�e�xa�Wh
zh
z5�\�h*bR$h�0#h*bR0J&CJOJQJ^JaJh&s~h&s~B*ph��� h�0#h*bRCJOJQJ^JaJh-9nCJOJQJ^JaJh-h-9nh�0#h*bRh-9n0J&CJOJQJ^JaJ*h-9nh*bR0J&5�CJOJQJ\�^JaJ*h-9nh-9n0J&5�CJOJQJ\�^JaJ$h
z0J&5�CJOJQJ\�^JaJtJ�J(KRKsK�K�K�L�LM�N�N�N�O�P7Q�Q�����������������gd�>�d��d�d&dP����[$\$gd�0#d�gd�0#
d�gd�:bm$p$gd-9nm$p$
dhgd
zm$p$gd�:bm$p$��^��gd�:bm$p$)
&F
��gd�:bm$p$
&Fgd�:bm$p$�LMMM�N�N�N�N�N�N�N�NOOhOiO�O����ɱ��rjV>V>,"h�0#h�0#0J05�OJQJ\�^J/jh�0#hC`�5�CJOJQJU\�^JaJ&h�0#h�0#5�CJOJQJ\�^JaJh�0#OJQJh-9nh-9nB*OJQJph���/h
zh*bR5�B*CJOJQJ\�^JaJph/h
zh�0#5�B*CJOJQJ\�^JaJph/h
zh-9n5�B*CJOJQJ\�^JaJph/h
zh
z5�B*CJOJQJ\�^JaJphh�0#h-9nh-9nh
zh
z5�\�h
zh-9n5�\��O�O�O�O�O�O�O�O�O�O�O�O�O�O�OMPNPkPlP�P�P�Խ������m�m�eaeNeN>h�xCJOJPJQJ^JaJ$h�0#h�0#CJOJPJQJ^JaJhC`�jhC`�U)h-9nh-9nB*CJOJQJ^JaJph���$h�0#h�0#0J3CJOJQJ^JaJ h�0#h�0#CJOJQJ^JaJ-h�0#h�0#0J2B*CJOJQJ^JaJph�-h�0#h�0#0J1B*CJOJQJ^JaJph�/jh�0#hC`�5�CJOJQJU\�^JaJ&h�0#h�0#5�CJOJQJ\�^JaJ�P�P�P�PQ"Q#Q2Q3Q6Q7Q9Q:QlQmQnQ��Ѽ������oU@.U#h�>�0J6B*CJOJQJaJph)h�>�h�>�0J6B*CJOJQJaJph3h�>�h�>�0J5�B*CJOJQJ\�^JaJph%h�>�h�xB*CJOJQJaJph+h�xh�x5�B*CJOJQJ\�aJph#h�>�0J6B*CJOJQJaJph#h�x0J6B*CJOJQJaJph)h�xh�x0J6B*CJOJQJaJph!h�xh�x0JB*CJaJph"h�xh�x5�CJOJQJ\�aJh�xCJOJQJaJnQoQ|Q�Q�Q�Q�Q�Q�Q�Q�Q�QfRgR�R�R�R�R�R�RSNS�����Ͷ��{sos�sd\T?;7h�*2h�>�)h-9nh�xB*CJOJQJ^JaJph���h�xB*ph���h�0#B*ph���h-9nh-9nB*ph���hC`�jhC`�U h�0#h�0#CJOJQJ^JaJ-h-9nh-9nB*CJOJPJQJ^JaJph���$h�0#h�0#CJOJPJQJ^JaJ-h�>�h�0#B*CJOJPJQJ^JaJph%h�>�h�>�B*CJOJQJaJph!h�>�h�>�0JB*CJaJphh�>�0JB*CJaJph�Q�Q�R�RSS$S%SMSNSOSPS�����������
d�gd�0#m$p$d��d�d&dP����[$\$gd�0#NSOSPS��)h-9nh�xB*CJOJQJ^JaJph���h�K�A	0PP&P	1�h:p�0#��. ��A!�p"��#�&$�5%�����A	0PP&P	1�h:p�0#��. ��A!�p"��#�&$�5%�����A	0PP&P	1�h:p�0#��. ��A!�p"��#��$��%�����n7���������666666666vvvvvvvvv666666>666666666666666666666666666�6666666666�666666666666hH66666666666666666666666666666666666666666666666666666666666666666�62���� 0@P`p������2(�� 0@P`p������ 0@P`p������ 0@P`p������ 0@P`p������ 0@P`p������ 0@P`p��8X�V~$OJPJQJ^J_HmH	nH	sH	tH	J`�Jq �Normald��CJ_HaJmH	sH	tH	^@^5�x�	Heading 1$���<@&"5�CJ KH OJPJQJ\�^JaJ ``(�_�	Heading 2$���<@&$56CJOJPJQJ\]^JaJd@2d=9�	Heading 3d��d�d@&[$\$5CJ!OJPJQJ\^JaJ!N@N$Y��	Heading 4$���<@&5CJPJ\aJR@R%Y��	Heading 5
���<@&56CJPJ\]aJDA`�D
Default Paragraph FontRi@�R0Table Normal�4�
l4�a�(k �(
0No List@�@�@g([ List Paragraph	^��m$R�O�R=9�Heading 3 Char5�CJ!OJPJQJ\�^JaJ!6U@�6	=90	Hyperlink>*B*	ph3�`^@"`=90Normal (Web)d��d�d[$\$CJOJPJQJ^JaJ(��1(=9bold15�\�N�ONKV�0CM21d#�1$7$8$H$CJOJPJQJaJN�ONKV�0CM68d��1$7$8$H$CJOJPJQJaJN�ON]r90CM30d��1$7$8$H$CJOJPJQJaJd�o�rd]r9Default1$7$8$H$-B*CJOJPJQJ_HaJmH	phsH	tH	.�Oqr.]r90CM33	B*ph�.�Oqr.]r90CM36	B*ph�4�qr4]r90CM13d	B*ph�4�qr4]r90CM10d	B*ph�.�Oqr.�x�0CM34	B*ph�.�Oqr.�x�0CM32	B*ph�.�qr.U3_0CM56	B*ph�.�Oqr.U3_0CM57	B*ph�.X�.�=�@Emphasis6�]�8��8�=�goog_qs-tidbit-0F�"F�Putext"d���CJOJPJQJ^JaJ"��1"�Putext3R��ARY��Heading 4 Char5�CJOJPJQJ\�^JaJX��QXY��Heading 5 Char$5�6�CJOJPJQJ\�]�^JaJFb@�aF	Y�0	HTML CodeCJOJPJQJ^JaJo(P�rPY�notep1'd��5CJOJPJQJ\^JaJX���X�_�Heading 2 Char$5�6�CJOJPJQJ\�]�^JaJ�e@��	*�_0HTML PreformattedA)d���2�(�
P�x�4 �#\'�*�.2�5@9CJOJPJQJ^JaJ\���\)�_0HTML Preformatted CharCJOJPJQJ^JaJp��p�_titleinexample+d��d�d[$\$$56CJOJPJQJ\]^JaJl��l�_titleintable,d��d�d[$\$$56CJOJPJQJ\]^JaJ,���,�_italic16�]�b��b�_
tablefootnote.d��d�d[$\$CJOJPJQJ^JaJ0���0�_	variable16�]�2�O�2�0#title25�CJ\�aJ:�O�:�0#authors1�<�B*ph�1.0�O�!0�0#author1	B*phNNN>�O�1>�0#
attribute1�<�CJaJ*��A*�N-	long_textV�/�QV�x�Heading 1 Char"5CJ KH OJPJQJ\^JaJ *W`�a*�x`Strong5�\�PK!����[Content_Types].xml���j�0E����ж�r�(��΢Iw},��-j��4	��w�P�-t#bΙ{U�����T�U^h�d}㨫��)��*1P�'��	�^��W��0)��T�9<�l�#��$yi}��;�~@��(��H����u�*Dנz��/0�ǰ��$��X��3aZ����,�D0j~�3߶�b��~i>���3�\`�?�/�[���G��\�!�-�Rk.�s�Ի�..���a濭?��PK!�֧�6_rels/.rels���j�0���}Q��%v/��C/�}�(h"���O�
����=������ ����C?�h�v=��Ʌ��%[xp��{۵_�Pѣ<�1�H�0���O�R�Bd���JE�4b$��q_����6L�R�7`������0̞O��,�En7�Li�b��/�S���e��е�����PK!ky���theme/theme/themeManager.xml�M
� @�}�w��7c�(Eb�ˮ��C�AǠҟ����7��՛K
Y,�
�e�.���|,���H�,l����xɴ��I�sQ}#Ր���� ֵ+�!�,�^�$j=�GW��)�E�+&
8���PK!����Ptheme/theme/theme1.xml�YOo�6��w toc'vu�ر�-M�n�i���P�@�I}��úa��m�a[�إ�4�:lЯ�GR��X^�6؊�>$�������!)O�^�r�C$�y@�����/�yH*��񄴽)�޵��߻��UDb�`}"�qۋ�Jח���X^�)I`n�E���p)���li�V[]�1M<������O�P��6r�=���z�gb�Ig��u��S�eb��O������R�D۫����qu	�g��Z����o~ٺlAp�lx�pT0���+[}`j���zA��V�2�F���i�@�q�v�֬5\|��ʜ̭N��le�X�ds���jcs���7���f����
��W��+�Ն�7����`���g�Ș��J���j|��h(�K��D-����
dX��iJ�؇(��x$(��:��;�˹!�I_�T��S1�����?E��?�����?ZBΪm���U/������?�~����xY���'���y5�g&΋/����ɋ�>���G�M�Ge���D�����3Vq%'#q�����$�8��K�����)f�w9:ĵ��
x}r�x����w���r�:\TZaG�*�y8I�j�bR��c|XŻ�ǿ�I
u3KG�nD1�NIB�s���
��R��u���K>V�.EL+M2�#'�f��i~�V��vl�{u8��z��H�
�*���:�(W�☕
~��J�T�e\O*�tHG��HY��}KN�P�*ݾ˦���TѼ�9/#��A7�qZ��$*c?���qU��n��w�N��%��O��i�4=3ڗP��
����1�P�m\\9���������Mؓ�2a�D�]�;Yt�\��[x����]�}Wr��|�]��g-���
eW�
�)6-r��CS�j��
i�d	�DЇA�ΜIqbJ#x�꺃6k���#��A�Sh��&ʌt(Q�%��p%m��&]�caSl=�X�����\P�1�Mh�9�M��V�dDA��aV�B��[݈fJ�íP|8�քA�V^��f
�H��n���-��"�d>�z��n��NJ�	�ة�>�b���&����2��v����Kyϼ��D:����,AGm��\nz��i�Ù��.uχYC�6�OMf��3o�r��$��5�����NH�T[XF64�T,ќ���M0�E)`#�5�XY�`�פ;��%�1�U�٥m;���R>QD����D�cp�U�'��&LE�/p���m���%]�����8fi��r�S4�d7y\�`�J�n���ί�I�R��3U�~7+���׸#��m�q�BiD���������i*�L6�9�m�Y&���i���HE��=(K&�N!V�.K�e�LD�ĕ�{D	����vEꦚde��NƟ��e�(�MN9ߜR�6����&3(��a���/D��U�z�<�{ˊ�Y��ȳ����V���)�9�Z[��4^n��5���!J��?��Q�3�eBo�C����M����m<�.�vp�����IY�f���Z�Y_p�[�=al-�Y�}Nc͙���ŋ4vfa��vl����'S��A�8�|�*u�{��-�ߟ0%M0�7%����<���ҍ���PK!
ѐ��'theme/theme/_rels/themeManager.xml.rels��M
�0���wooӺ�&݈Э���5
6?$Q��
�,.�a��i����c2�1h�:�q��m��@RN��;d�`��o7�g�K(M&$R(.1�r'J��ЊT���8��V�"��AȻ�H�u}��|�$�b{��P����8�g/]�QAsم(����#��L�[������PK-!����[Content_Types].xmlPK-!�֧�6+_rels/.relsPK-!ky���theme/theme/themeManager.xmlPK-!����P�theme/theme/theme1.xmlPK-!
ѐ��'�	theme/theme/_rels/themeManager.xml.relsPK]�
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<a:clrMap xmlns:a="http://schemas.openxmlformats.org/drawingml/2006/main" bg1="lt1" tx1="dk1" bg2="lt2" tx2="dk2" accent1="accent1" accent2="accent2" accent3="accent3" accent4="accent4" accent5="accent5" accent6="accent6" hlink="hlink" folHlink="folHlink"/>'@iPK��������������������'@il��ZPK
�����
C�����
������
�98���9"�$�*31s4�6�9}<�?�C[H�L�O�PnQNSPS*,./0245679:<=?@BDEGHIJL4�Z�'�3�7�=MCtJ�QPS+-138;>ACFK5j5�5�564666�6�6�67#7%7�7�7GhG�G�GMHkH�IfJ�JPKX���X���X���X���X���X����X���X����T� #��A�A@���������p���(	�
��B
�
����
��B
�
����
��B
�
����
��B
�S����	?����PK�YWt>
��t�z$	t��i1008312
sthref1906i1008336
sthref1908
sthref1909
sthref1910i1008351
sthref1911i1008356i1008361i1008365i1008315�4�4�7789}9�9�9:b<�=�FQK	
�4�4�7789}9�9�9:b<�=�FQKGLNY��RXx	|	�	�	
	
��PWx_g����&,����!&��m$s$&&�-�-//g/i/T8Z8�<�<�>�>�@�@A(A�A�A�A�A�A�AB,BhBrB6C@CGCMC\CbC�C�C�C�C�C�CFD\DFF�G�GtH�H�H�H�H�H�H�HI"I�I�I�JQKGY��@M��NV������"��������	�	�
�
�
�
�
�
����fx����ES��Zc����PW%dp��i���dpy � � � �!�!�!�!�"�"�"�"�"�"5$J$�$�$�%�%(#(C(K(k,m,�-�-[.j.�/�/#1$1�1�1.2@2�2�2n3w3�7
8t8�8�8�839?9�9�9==�@�@�A�A	EE�FGzH�H�I�I�JQK3333333333333333333333333333333333333333333333333333333333333333333>����
���]��Zst������"#3(5()4)�.�.�/�/66�7;8D899}9�9M@[@]@z@ZBtBUCsC�DE�F�F�IgJ�J�J�JK#KQK%�w�Z�>����������9o��D����������������������w|8X�����������P:�W�#����������i,$��V�����������f&�e6k����������^�+>b����������>j�.FPW���������P)�1 	�Q����������S2��T����������y,2.�fo����������v�3>�����������!l99�i&���������V?�����������
�A��>������������F*�o����������<M&x����������%P�c�3���������	�P,aDD���������S4MQ�N�D����������W�R������������8:S��^�����������KSTz���������rh[
�\���������<|[B]���������lT�[�>����������9�`�����������	a��
���������C&bL*��������� dh����������KNzlT������������h�o:d�>����������v�;����������4Mw���y���������4hyH����������64�{�[�t����������������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(���������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(�������^��`���OJQJo(��������^��`���OJQJ^Jo(o��p���^�p`���OJQJo(����@���^�@`���OJQJo(�������^�`���OJQJ^Jo(o������^��`���OJQJo(��������^��`���OJQJo(��������^��`���OJQJ^Jo(o��P���^�P`���OJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(���������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(��h
�����^��`����h�H.�h
�����^��`����h�H.�h
���L�^��`�L��h�H.�h
�m���^�m`����h�H.�h
�=���^�=`����h�H.�h
�
�L�^�
`�L��h�H.�h
�����^��`����h�H.�h
�����^��`����h�H.�h
�}�L�^�}`�L��h�H.�������^��`���CJOJQJo(���������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���*���^�*`���OJQJo(��������^��`���OJQJ^Jo(o������^��`���OJQJo(��������^��`���OJQJo(����j���^�j`���OJQJ^Jo(o��:���^�:`���OJQJo(����
���^�
`���OJQJo(��������^��`���OJQJ^Jo(o������^��`���OJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���.��������^��`���.��p����p^�p`���.��@����@^�@`���.������^�`���.��������^��`���.��������^��`���.��������^��`���.��P����P^�P`���.�������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(���������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���8���^�8`���OJQJo(�������^�`���OJQJ^Jo(o���	���^��	`���OJQJo(��������^��`���OJQJo(����x���^�x`���OJQJ^Jo(o��H���^�H`���OJQJo(�������^�`���OJQJo(��������^��`���OJQJ^Jo(o������^��`���OJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(���������^��`���CJOJQJo(����������^��`���CJOJQJo(o��p����p^�p`���CJOJQJo(����@����@^�@`���CJOJQJo(��������^�`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����������^��`���CJOJQJo(����P����P^�P`���CJOJQJo(��%�f&�P:�i,$S4MQ!l99P)�1w|	a�h�o9o��W�R dh4hy�y,2�S2�9�`�KS8:S�KNzl��F�^�+C&brh[	�P64�{�w�<|[�v�3V?�<M�v>j�.�%PlT�[4Mw�
�A������������������������������������������������������������������������������������������������������������������������������������������������������%��%																																				�6hj9�p�l5*%<�B�%*1� 

���������G%bZgiZ
�))�P� 

��������{?h�)!���)dX}��'[	K?]#e�o�'[?0� 5k 5k 5k 5k �1��L�=�W�"��R�C�R��Ngz�O	>T��a%
���s:
rR0	Kh��p�	Q
'�d� 

���������kq
ys�Z��
5>�[>T��O�_.gs��m���
!p�R�]O{?h� 

���������p9�8�U�T<�e9u*L�_s�� 5k 5k 5k 5k 
�ys�Z�:R�e9u�z��;SM�y�{?h� 

��������fQ�dUNJ%$�-b)C�R_s�9��.g�Az�;SM� 

���������2��rCD��s��2$�8�U��Uw�
�)!y�v� 

��������q8wN�D=&��~MLZ#4q9
�)� 

��������Uw�N�J�T-b)s�R>
B�9�O@&+Kz�9�U�K��DD1j0�wI1� 

���������)!5>�[S!+ �e�H�!�a%
� 

���������

"�9��^E"�?5/� 

��������<O#�;5>�l�%n}�7O@&iHC,oq�&�=�I�*�&��~�QA).g9
�)Ngz�*l*�
�{=+�dM=bR�+s�h�+�[�x� 

��������! ,j9�p� 

��������iHC,NgzN�,+Kz�+-ys�Z� 

���������(h-Z/�O'�-�N�J�?5/��
?0rR0�B� 5k 5k 5k 5k fi�05>�[%*1NgzwI15>�[�DD1Ngz�u15>�[D,�1s��+�5s��>�6�3_S� 

��������I�6oq�&n}�7fQ���9iHC,� 

���������&d;#e�o�,�;��
5*%<{MN.B =j9�p�%:=O@&�dM=�#�^0K�=wN�D�L�=�2�R�;5>�p9xCg>�v� 

���������-n?��~Yf�?GAiHC,�iTA�-�A�sWR>
B%;Co�rCD-b)4nnD{?hwN�DiHC,�G�R�� 

��������vH�K�h��H�i� 

��������fGI#e�o�=�IdUNJ�W��N�J-b)�yK�G%�TKGA�;SMiHC,{MN��XVm<O�*l*[�O��~� 

��������Z/�O�
))�P
�cU�P�i� 

��������V>Q�[�x�P�RC�RLOgW�2�R�3_SwN�D��S���7�S�)!� 

��������9h�S�3_S�9�UJ	�o�
�U�N�J�8�US!LOgW�sW�O	�����,�WNgz�)dXI�6��X�1��q*Yfi�0>P3Y�kq
wc�Z�;SMys�Z-b)%6~[iHC,5>�[MLZ}\+Kz�#�^81�h@C�^��~�O�_%$��$�_�QA)� 

���������>�`�DD1�A�b�(h-� 

���������
LdC�R
'�d�%:=!�d*�n9t�d�)!+ �e�{=+w2Pg{?hqk�h�[�x�K�h!�d81�hYf�?�iNgzB0_i��bZgi�p9��i5>�[�w�i�
� 

���������j�j�u1J,kwI1� 

���������=�m-b)� 

��������*�n�l%;Co9�#e�o�)!J	�oxxx�kp�[�x��p�)!j9�p-b)�Z@r.gX*�r?]� 

��������wR�t�;SM� 

����������t*L�	K�e9uC�R2Lu9
�)� 

���������vC�RD�v?]�[�x��(Q%yUw� 

���������3�yfi�0Ngz�P�R�%�z�u1� 

����������zj9�p� 

���������\�zO@&� 

���������Z<|%*1��~��
^Y�[�x"���Q��F&V�xx�_�
&'
-
zoT
Uy�0#�u$[_&�N-:/Y/�*2�4
q7=9]r9�;=8F>EUC�jC%vF�&J�7O*bRGTg([U3_�:b�d_ l-9nhun�Pu&s~!<�F|���KV��x�#�S�v�[]��8��>�"U��#�`��%�N7�	�X�6m�)!�q ��K�Y��=�p�)�?n�+E�Z*�:+��J��9�H��`��b��y�4&�(�C`�d@��s��J�J�@�F�F���F�FPKh@��Unknown������������G��*�Ax�	�Times New Roman5��Symbol3.��*�Cx�	�Arial7.���@�Calibri7���K@�Cambria?=�	�*�Cx�	�Courier New;��WingdingsA���� B�Cambria Math"q���h�}G҅g�b'0-�?&��=@&�!�p�n���20�J(K
3�q���HX	�	$P�����������������������9�2!xx���adeladel�%	

 !"#$����Oh��+'��0h�������	��
$0
<HPX`�adelNormaladel8Microsoft Office Word@ ��@x��(�@"�~S��@Lq�&��-�?����՜.��+,��D��՜.��+,��,�hp|�������
����&�JTitlex 8@_PID_HLINKS�A00{r�http://www.find-book.co.uk/book/Expert-Oracle-Database-Architecture-Oracle-Database-Programming-9i-10g-and-11g-Techniques-and-Solutions-2nd-Edition/1430229462.htm�	->Lhttp://www.find-book.co.uk/book/Beginning-Oracle-Programming/186100690X.htm�	Zhttp://www.find-book.co.uk/book/Oracle-Database-11g-The-Complete-Reference/0071598758.htm�	?Dhttp://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm	i1008365;	Dhttp://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm	i1008361<Dhttp://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm	i1008356;Dhttp://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm	i1008351<Dhttp://docs.oracle.com/cd/B19306_01/network.102/b14266/apdvpoli.htm	i1008336	

 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLM����OPQRSTU����WXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������Root Entry��������	�F��J�&���Data
������������N1Table��������VԦWordDocument
����ɚSummaryInformation(�������������DocumentSummaryInformation8���������MsoDataStore����������>�&����J�&��C��PYEW�M�G�PBT�TL�I�A==2����������>�&����J�&��Item
����	�����Properties������������UCompObj����
y����������������	����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������<b:Sources SelectedStyle="\IEEE2006OfficeOnline.xsl" StyleName="IEEE 2006" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns="http://schemas.openxmlformats.org/officeDocument/2006/bibliography"></b:Sources>
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<ds:datastoreItem ds:itemID="{604F4A0B-B845-4133-AF3C-14FE4CB808A4}" xmlns:ds="http://schemas.openxmlformats.org/officeDocument/2006/customXml"><ds:schemaRefs><ds:schemaRef ds:uri="http://schemas.openxmlformats.org/officeDocument/2006/bibliography"/></ds:schemaRefs></ds:datastoreItem>��
����	�F'Microsoft Office Word 97-2003 Document
MSWordDocWord.Document.8�9�q

Youez - 2016 - github.com/yon3zu
LinuXploit