193 resultados para KYOTO PROTOCOL
Resumo:
Reducing Emissions from Deforestation and Forest Degradation and the role of conservation, sustainable management of forests and enhancement of forest carbon stocks in developing countries (REDD+) has emerged out of the United Nations Framework Convention on Climate Change (UNFCCC)/Kyoto Protocol negotiations. It is intended to be a mechanism to channel funding (from both public and private sources) for reducing emissions from the forest sector. It is an international climate change policy that relies on national implementation. In order to attract and manage REDD+ investments (both public and private), countries need to decide on their approach to REDD+ implementation through a series of policy choices, and then implement those policy choices through strong legal frameworks. An important question for REDD+ host countries to consider, therefore, is how to develop robust legal structures to facilitate REDD+ implementation. These legal frameworks could be based on existing laws, and/or require new law making.
Resumo:
Land-use change, particularly clearing of forests for agriculture, has contributed significantly to the observed rise in atmospheric carbon dioxide concentration. Concern about the impacts on climate has led to efforts to monitor and curtail the rapid increase in concentrations of carbon dioxide and other greenhouse gases in the atmosphere. Internationally, much of the current focus is on the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC). Although electing to not ratify the Protocol, Australia, as a party to the UNFCCC, reports on national greenhouse gas emissions, trends in emissions and abatement measures. In this paper we review the complex accounting rules for human activities affecting greenhouse gas fluxes in the terrestrial biosphere and explore implications and potential opportunities for managing carbon in the savanna ecosystems of northern Australia. Savannas in Australia are managed for grazing as well as for cultural and environmental values against a background of extreme climate variability and disturbance, notably fire. Methane from livestock and non-CO2 emissions from burning are important components of the total greenhouse gas emissions associated with management of savannas. International developments in carbon accounting for the terrestrial biosphere bring a requirement for better attribution of change in carbon stocks and more detailed and spatially explicit data on such characteristics of savanna ecosystems as fire regimes, production and type of fuel for burning, drivers of woody encroachment, rates of woody regrowth, stocking rates and grazing impacts. The benefits of improved biophysical information and of understanding the impacts on ecosystem function of natural factors and management options will extend beyond greenhouse accounting to better land management for multiple objectives.
Resumo:
The Kyoto Protocol is remarkable among global multilateral environmental agreements for its efforts to depoliticize compliance. However, attempts to create autonomous, arm’s length and rule-based compliance processes with extensive reliance on putatively neutral experts were only partially realized in practice in the first commitment period from 2008 to 2012. In particular, the procedurally constrained facilitative powers vested in the Facilitative Branch were circumvented, and expert review teams (ERTs) assumed pivotal roles in compliance facilitation. The ad hoc diplomatic and facilitative practices engaged in by these small teams of technical experts raise questions about the reliability and consistency of the compliance process. For the future operation of the Kyoto compliance system, it is suggested that ERTs should be confined to more technical and procedural roles, in line with their expertise. There would then be greater scope for the Facilitative Branch to assume a more comprehensive facilitative role, safeguarded by due process guarantees, in accordance with its mandate. However, if – as appears likely – the future compliance trajectories under the United Nations Framework Convention on Climate Change will include a significant role for ERTs without oversight by the Compliance Committee, it is important to develop appropriate procedural safeguards that reflect and shape the various technical and political roles these teams currently play.
Resumo:
It is now 20 years since the United Nations Conference on Environment and Development, better known as the Earth Summit was held in Rio de Janeiro. An important achievement of the conference was an agreement on the Climate Change Convention which in turn led to the Kyoto Protocol. Another was agreement to 'not carry out any activities on the lands of indigenous peoples that would cause environmental degradation or that would be culturally inappropriate'. Recently we have seen an updated and revised conference in Rio where the same issues were again discussed. Since then ideas about sustainability have changed considerably and to some extent they have merged with ideas about corporate social responsibility and about governance, determined by the economic and political fortunes of the actors involved. It is now time therefore to re-examine the concept of sustainability in the aftermath of this conference and to consider what issues are now considered pertinent around the world. This book therefore takes different positions concerning different aspects of this vital topic.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
This paper presents a secure communication protocol which can be used as the framework for an e-tendering scheme. This protocol is focused on securing the integrity of tendering documents and ensuring that a secure record of document generation is kept. Our protocol provides a mechanism to manage e-tendering contract evidence as a legal record in a unique and effective manner. It is the starting point of reliable record keeping. To a certain extent, it also addresses existing security problems in the traditional tendering processes.
Resumo:
We aim to assess the effects of end-of-life care pathways, compared with usual care or with care guided by another end-of-life care pathway across all healthcare settings (hospitals, residential aged care facilities, community). In particular, we aim to assess the effects on symptom severity and quality of life of people who are dying and/or those related to the care such as families, caregivers and health professionals.
Resumo:
The term self-selected (i.e., individual or comfortable walking pace or speed) is commonly used in the literature (Frost, Dowling, Bar-Or, & Dyson, 1997; Jeng, Liao, Lai, & Hou, 1997; Wergel-Kolmert & Wohlfart, 1999; Maltais, Bar-Or, Pienynowski, & Galea, 2003; Browning & Kram, 2005; Browning, Baker, Herron, & Kram, 2006; Hills, Byrne, Wearing, & Armstrong, 2006) and is identified as the most efficient walking speed, with increased efficiency defined by lower oxygen uptake (VO^sub 2^) per unit mechanical work (Hoyt & Taylor, 1981; Taylor, Heglund, & Maloiy, 1982; Hreljac, 1993). [...] assessing individual and group differences in metabolic energy expenditure using oxygen uptake requires individuals to be comfortable with, and able to accommodate to, the equipment.