44 resultados para Certificate
Resumo:
The BRAKE Driver Awareness Program provides evidence-based behaviour, risk, attitude and knowledge education for young drivers. BRAKE was founded during 2006 by Queensland Police Sergeant Rob Duncan and has been delivered to more than 35,000 senior secondary students since 2007. BRAKE is a participant directed program supported by resources provided at no cost. It includes eight parts able to be delivered in different configurations. BRAKE is endorsed by the Queensland Police and Queensland Ambulance Services. It is recognised by the Queensland Studies Authority as a Queensland Certificate of Education registered life skills course. This session is a must attend for secondary teachers, coordinators, staff in senior leadership positions and other stakeholders seeking a unique approach to adolescent road safety education. It will conclude with an opportunity to consider how BRAKE can be integrated into the senior secondary Health Education curriculum or pastoral care, social action and personal development programs.
Resumo:
This article considers the changes to the Swimming Pools Act 1992 (NSW)(Act) which established a State-wide online register of all private swimming pools in NSW requiring pool owners to register their pools by 19 November 2013. Amendments to the Act introduced changes to the conveyancing and residential tenancy regulations to require vendors and landlords to have a valid Compliance Certificate issued for their swimming pool before offering the property for sale or lease. This article provides a brief overview of the new sale and leasing requirements effective from 29 April 2014, focusing on its application to lot owners within strata and community title schemes and other owners of water front properties with pools on Crown Land Reserves.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
"What is Bluebird AR? Bluebird AR was the ABC's alternate reality drama set around the leak of Bluebird, a clandestine geoengineering initiative created by eco-billionaire Harrison Wyld. Proposing a fictional scenario set against a backdrop of real world possibilities, Bluebird AR took some of the conventions of the well-established alternate reality game (ARG) genre and pulled them into the relatively new area of online drama, to create a hybrid entertainment form best described as 'participatory drama'. With Bluebird AR's interactive narrative centred on the experimental science of geoengineering, the deliberate manipulation of the Earth's atmosphere to counteract global warming, the events and characters in the Bluebird story were entirely fictional but fused with reality online. Inhabiting a mixture of third party social media spaces and websites created by the ABC, the story incorporated real online articles, scientific journals, media and debate around geoengineering. In an Australian first, ABC Innovation launched Bluebird AR on 27 April 2010, with a 6 week live phase. Audience members were invited to play collectively to help 'unlock the drama' and push forward the emerging narrative, or passively watch the story unfold in real-time across the internet. Bluebird AR subverted ARG conventions with the high quality of its production and assets, and raised the stakes for online drama with its level of audience participation." © 2014 ABC "Introduction One of the most exciting creative challenges of producing Bluebird AR was formulating the broad array of visual styles and treatments required for the project's diverse range of content. Many assets also needed to translate well not only online but across other media, including television and print. With the project's producers keen to create a visually rich narrative with high production values from the outset, inspiration for the production design for various aspects of the Bluebird story began in the earliest pitching phase in September 2008. Particular visual treatments and styles for Bluebird's characters, their web spaces and real world possessions were formulated concurrently with the creation of their profiles. Ideas around how various clues and gameplay spaces might look and feel were also explored at this early stage. Bluebird AR's small but tight creative team produced 7 website designs and brands, motion graphics for title sequences and logo animations, rotoscope animation, 3D compositing and animation, 3D wireframes and schematics, countless Photoshop composites, and a vast array of character assets for the DC (including Kyle's Bluebird Labs security pass and resignation letter, Kruger's American and Russia passports and birth certificate, Harrison's divorce papers, and more)…" © 2014 ABC
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
Background Understanding how different socioeconomic indicators are associated with transport modes provide insight into which interventions might contribute to reducing socioeconomic inequalities in health. The purpose of this study was to examine associations between neighbourhood-level socioeconomic disadvantage, individual-level socioeconomic position (SEP) and usual transport mode. Methods This investigation included 11,036 residents from 200 neighbourhoods in Brisbane, Australia. Respondents self-reported their usual transport mode (car or motorbike, public transport, walking or cycling). Indicators for individual-level SEP were education, occupation, and household income; and neighbourhood disadvantage was measured using a census-derived index. Data were analysed using multilevel multinomial logistic regression. High SEP respondents and residents of the most advantaged neighbourhoods who used a private motor vehicle as their usual form of transport was the reference category. Results Compared with driving a motor vehicle, the odds of using public transport were higher for white collar employees (OR1.68, 95%CrI 1.41-2.01), members of lower income households (OR 1.71 95%CrI 1.25-2.30), and residents of more disadvantaged neighbourhoods (OR 1.93, 95%CrI 1.46-2.54); and lower for respondents with a certificate-level education (OR 0.60, 95%CrI 0.49-0.74) and blue collar workers (OR 0.63, 95%CrI 0.50-0.81). The odds of walking for transport were higher for the least educated (OR 1.58, 95%CrI 1.18-2.11), those not in the labour force (OR 1.94, 95%CrI 1.38-2.72), members of lower income households (OR 2.10, 95%CrI 1.23-3.64), and residents of more disadvantaged neighbourhoods (OR 2.73, 95%CrI 1.46-5.24). The odds of cycling were lower among less educated groups (OR 0.31, 95% CrI 0.19-0.48). Conclusion The relationships between socioeconomic characteristics and transport modes are complex, and provide challenges for those attempting to encourage active forms of transportation. Further work is required exploring the individual- and neighbourhood-level mechanisms behind transport mode choice, and what factors might influence individuals from different socioeconomic backgrounds to change to more active transport modes.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
Resumo:
Sessional Academics enhance students’ learning experience by bringing a diverse range of perspectives and expertise into the classroom. As industry specialists, research students, and recent graduates who have excelled in their courses, they complement the discipline expertise of career academics. With increasing casualization of the academic workforce, Sessional Academics now deliver the majority of face-to-face undergraduate teaching in Australian Universities. To enable them to realize their full potential as effective contributors to student learning and course quality, universities need to offer effective training and access to advice and support and facilitate engagement in university life. However, in the face of complex and diverse contexts, overwhelming numbers, and the transitory nature of sessional cohorts, few universities have developed a comprehensive, systematic approach. During the past three years at QUT, we have set out to develop a multifaceted approach to Sessional Academic support and development. In this paper I will explain why and how we have done so, and describe the range of strategies and programs we have developed. They include a central academic development program, which is structured and scaffolded with learning objectives and outcomes, and aligned with a graduate certificate in Academic Practice; a Sessional Academic Success program, which deploys experienced, school-based sessional academic success advisors to provide local support, build a sense of community, and offer discipline focused academic development; an online, dialogic communication strategy; and opportunities to present and be acknowledged for good learning and teaching practices. Together, these strategies have impacted on sessional academics’ confidence, learning and teaching capacity, reflection and engagement.
Resumo:
This chapter interrogates what recognition of prior learning (RPL) can and does mean in the higher education sector—a sector in the grip of the widening participation agenda and an open access age. The chapter discusses how open learning is making inroads into recognition processes and examines two studies in open learning recognition. A case study relating to e-portfolio-style RPL for entry into a Graduate Certificate in Policy and Governance at a metropolitan university in Queensland is described. In the first instance, candidates who do not possess a relevant Bachelor degree need to demonstrate skills in governmental policy work in order to be eligible to gain entry to a Graduate Certificate (at Australian Qualifications Framework Level 8) (Australian Qualifications Framework Council, 2013, p. 53). The chapter acknowledges the benefits and limitations of recognition in open learning and those of more traditional RPL, anticipating future developments in both (or their convergence).
Resumo:
Queensland University of Technology (QUT), School of Nursing (SoN), has offered a postgraduate Graduate Certificate in Emergency Nursing since 2003, for registered nurses practising in an emergency clinical area, who fulfil key entry criteria. Feedback from industry partners and students evidenced support for flexible and extended study pathways in emergency nursing. Therefore, in the context of a growing demand for emergency health services and the need for specialist qualified staff, it was timely to review and redevelop our emergency specialist nursing courses. The QUT postgraduate emergency nursing study area is supported by a course advisory group, whose aim is to provide input and focus development of current and future course planning. All members of the course advisory were invited to form an expert panel to review current emergency course documents. A half day “brainstorm session”, planning and development workshop was held to review the emergency courses to implement changes from 2009. Results from the expert panel planning day include: proposal for a new emergency specialty unit; incorporation of the College of Emergency Nurses (CENA) Standards for Emergency Nursing Specialist in clinical assessment; modification of the present core emergency unit; enhancing the focus of the two other units that emergency students undertake; and opening the emergency study area to the Graduate Diploma in Nursing (Emergency Nursing) and Master of Nursing (Emergency Nursing). The conclusion of the brainstorm session resulted in a clearer conceptualisation, of the study pathway for students. Overall, the expert panel group of enthusiastic emergency educators and clinicians provided viable options for extending the career progression opportunities for emergency nurses. In concluding, the opportunity for collaboration across university and clinical settings has resulted in the design of a course with exciting potential and strong clinical relevance.
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
The Community Aspirations Program in Education (CAP-ED) was started by CQUniversity’s Office of Indigenous Engagement in 2013. CAP-ED’s aim was to focus on building aspirations through small manageable learning projects, and to increase Aboriginal and Torres Strait Islander students’ participation in higher education. Initially the scope of the project was to develop and deliver an accredited certificate-level program to help Indigenous students transition into tertiary education by a) improving pathways and b) addressing their current knowledge gaps. However, the initial investigatory process and community consultation found that a more localised, targeted and intimate approach would work more effectively. In addition, a free or affordable certificate course that would meet community needs was beyond the financial scope of the project. From here, the Office of Indigenous Engagement began to explore other possibilities.
Resumo:
Background: In November 2013, the Queensland Department of Health announced its intention to pilot pharmacist vaccination for influenza in the 2014 flu season. The Pharmaceutical Society of Australia Queensland Branch was tasked with developing a training program for the pilot. Aim: The aim was to develop, implement and evaluate a training program for pharmacist vaccination relevant to the needs of Australian pharmacists. Method: Background content was delivered via two online modules, while training for practical injection skills and anaphylaxis management were provided in a face-to-face workshop. Participants were required to complete the Australasian Society of Clinical Immunology and Allergy (ASCIA) anaphylaxis e-training for pharmacists, and hold a current First-Aid and CPR certificate. On completion of the course, pharmacists were asked to evaluate the training program. Results: Overall, 157 pharmacists across Queensland completed the training. Participants rated the training highly on a 5-point Likert scale (>4.4 for all fields) for relevance to practice, comfort with the skill, confidence to do the task and relevance of the learning objectives to the training. Qualitative feedback indicated that a key component of the training was the ability to practice injections on each other. Conclusion: The findings demonstrate participants felt prepared for vaccination following completion of the training program, as reflected in the high level of confidence reported. A follow-up post-pilot will explore if this confidence was translated into practice during the implementation phase.