368 resultados para Delegation
Resumo:
The Safety Effectiveness Indicators (SEI) Project has used extensive research to determine what safety effectiveness measures can be developed by industry, for industry use to improve its safety performance. These indicators can measure how effectively the 13 safety management tasks1 (SMTs) selected for this workbook are undertaken. Currently, positive performance indicators (PPIs) are only able to measure the number of activities undertaken. They do not provide information on whether each activity is being undertaken effectively, and therefore do not provide data which can be used by industry to target areas of focus and improvement. The initial workbook contained six SMTs, and was piloted on various construction sites during August 2008. The workbook was refined through feedback from the pilot, and 13 SMTs were used in a field trial during the months of October, November and December 2008. The project team also carried out 12 focus groups in Brisbane, Canberra, Sydney and Melbourne during April, May and June 2008, and developed an initial format of this workbook through these groups and team workshops. Simplification of the language was a recurring theme, and we have attempted to do this throughout the project. The challenge has been to ensure we keep the descriptions short, to the point and relevant to all companies, without making them too specific. The majority of the construction industry participants also requested an alteration to the scale used, so a ‘Yes’/‘No’/’Not applicable’ format is used in this workbook. This workbook, based on industry feedback, is for use on site by various construction companies and contains 13 SMTs. However, you are invited to personalise the SEI tools to better suit your individual company and workplaces.
Resumo:
Cohen (1977) reviewed the then current research on occupational safety and stated that both strong company commitment to safety, and communication between all levels of a company are the most influential factors to improving safety. Other relevant factors included careful selection of staff, and early and continuous training throughout the lifetime with the company. These continue to be important factors in OHS today. There has been a continued decrease in the injury rates since Cohen’s review within the Australian construction industry, however, the construction industry has far more injuries and ill-health than the Australian average, with one fatality occurring on average per week in the Australian Construction Industry. The Fatality rate in the building and construction industry remains three times higher than the national average, and 15% of all industry fatalities are in the building and construction industry. In addition the construction industry pays one of the highest workers’ compensation premium rates – in 2001 alone approximately 0.5% ($267 million) of revenue would have to be allocated to the direct cost of 1998/99 compensations (Office of the Federal Safety Commissioner, 2006). Based on these statistics there is a need to measure and improve safety performance within the construction industry.
Resumo:
A major project in the Sustainable Built Assets core area is the Sustainable Sub-divisions – Ventilation Project that is the second stage of a planned series of research projects focusing on sustainable sub-divisions. The initial project, Sustainable Sub-divisions: Energy focused on energy efficiency and examined the link between dwelling energy efficiency and sub-divisional layout. In addition, the potential for on site electricity generation, especially in medium and high-density developments, was also examined. That project recommended that an existing lot-rating methodology be adapted for use in SEQ through the inclusion of sub divisional appropriate ventilation data. Acquiring that data is the object of this project. The Sustainable Sub-divisions; Ventilation Project will produce a series of reports. The first report (Report 2002-077-B-01) summarised the results from an industry workshop and interviews that were conducted to ascertain the current attitudes and methodologies used in contemporary sub-division design in South East Queensland. The second report (Report 2002-077-B-02) described how the project is being delivered as outlined in the Project Agreement. It included the selection of the case study dwellings and monitoring equipment and data management process. This third report (Report 2002-077-B-03) provides an analysis and review of the approaches recommended by leading experts, government bodies and professional organizations throughout Australia that aim to increase the potential for passive cooling and heating at the subdivision stage. This data will inform issues discussed on the development of the enhanced lot-rating methodology in other reports of this series. The final report, due in June 2007, will detail the analysis of data for winter 2006 and summer 2007, leading to the development and delivery of the enhanced lot-rating methodology.
Resumo:
The Cooperative Research Centre (CRC) for Construction Innovation is Australia’s national centre for research and innovation focused on the needs of the property, design, construction and facility management sectors. The period covered by this report is from 1 July 2001 to 30 October 2009. The report comprises of two parts. Part A details the future and possible future impact of the CRC including: The Future of the CRC, Research and Commercialisation, Economic Benefit to Australia, Public Good Benefits to Australia. Part B details the achievements during the funding period including: Economic Benefit and Commercialisation, Uptake of Research Results, Impact of Education Programs, CRC Operations.
Resumo:
These National Guidelines and Case Studies for Digital Modelling are the outcomes from one of a number of Building Information Modelling (BIM)-related projects undertaken by the CRC for Construction Innovation. Since the CRC opened its doors in 2001, the industry has seen a rapid increase in interest in BIM, and widening adoption. These guidelines and case studies are thus very timely, as the industry moves to model-based working and starts to share models in a new context called integrated practice. Governments, both federal and state, and in New Zealand are starting to outline the role they might take, so that in contrast to the adoption of 2D CAD in the early 90s, we ensure that a national, industry-wide benefit results from this new paradigm of working. Section 1 of the guidelines give us an overview of BIM: how it affects our current mode of working, what we need to do to move to fully collaborative model-based facility development. The role of open standards such as IFC is described as a mechanism to support new processes, and make the extensive design and construction information available to asset operators and managers. Digital collaboration modes, types of models, levels of detail, object properties and model management complete this section. It will be relevant for owners, managers and project leaders as well as direct users of BIM. Section 2 provides recommendations and guides for key areas of model creation and development, and the move to simulation and performance measurement. These are the more practical parts of the guidelines developed for design professionals, BIM managers, technical staff and ‘in the field’ workers. The guidelines are supported by six case studies including a summary of lessons learnt about implementing BIM in Australian building projects. A key aspect of these publications is the identification of a number of important industry actions: the need for BIM-compatible product information and a national context for classifying product data; the need for an industry agreement and setting process-for-process definition; and finally, the need to ensure a national standard for sharing data between all of the participants in the facility-development process.
Resumo:
These National Guidelines and Case Studies for Digital Modelling are the outcomes from one of a number of Building Information Modelling (BIM)-related projects undertaken by the CRC for Construction Innovation. Since the CRC opened its doors in 2001, the industry has seen a rapid increase in interest in BIM, and widening adoption. These guidelines and case studies are thus very timely, as the industry moves to model-based working and starts to share models in a new context called integrated practice. Governments, both federal and state, and in New Zealand are starting to outline the role they might take, so that in contrast to the adoption of 2D CAD in the early 90s, we ensure that a national, industry-wide benefit results from this new paradigm of working. Section 1 of the guidelines give us an overview of BIM: how it affects our current mode of working, what we need to do to move to fully collaborative model-based facility development. The role of open standards such as IFC is described as a mechanism to support new processes, and make the extensive design and construction information available to asset operators and managers. Digital collaboration modes, types of models, levels of detail, object properties and model management complete this section. It will be relevant for owners, managers and project leaders as well as direct users of BIM. Section 2 provides recommendations and guides for key areas of model creation and development, and the move to simulation and performance measurement. These are the more practical parts of the guidelines developed for design professionals, BIM managers, technical staff and ‘in the field’ workers. The guidelines are supported by six case studies including a summary of lessons learnt about implementing BIM in Australian building projects. A key aspect of these publications is the identification of a number of important industry actions: the need for BIMcompatible product information and a national context for classifying product data; the need for an industry agreement and setting process-for-process definition; and finally, the need to ensure a national standard for sharing data between all of the participants in the facility-development process.
Resumo:
UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.
Resumo:
This short newsletter article discusses the Queensland University of Technology's (QUT) delegation at the 2011 Maori and Indigenous Doctoral (MAI) Conference hosted by Te Whare Wananga o Awanuiarangi (Indigenous University), Whakatane, New Zealand. The newsletter is free to download.
Resumo:
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.