47 resultados para Certificate pinning

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Theodore v Mistford Pty Ltd [2005] HCA 45, the High Court considered certain principles governing the creation of an equitable mortgage by the deposit of a title deed as first developed by the English courts of equity with respect to old system conveyancing. The decision will be of interest to Queensland practitioners as it concerned the application of these equitable principles to Torrens land regulated by the provisions of the Land Title Act 1994 (Qld) and, in particular, the operation of s 75 of the Land Title Act 1994 (Qld) which provides: (i) An equitable mortgage of a lot may be created by leaving a certificate of title with the mortgagee (ii) Subsection (1) does not affect the ways in which an equitable mortgage may be created.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many students enter business degrees without a defined career goal beyond working in the business world and adopt a scattergun approach to employability by accumulating certifications accessed through individual subjects. Yet, space and time limitations commonly prevent extended exposure to rewarding and interesting career subfields within main specialisations. This case study draws on student feedback collected over three years exploring students’ career interest following an elective human resource development subject in the final stage of a human resources major. Project-based curriculum provided students with scaffolded learning while undertaking key multiphase human resource development tasks. Subsequently, students reported human resource development career interest and intent, attributed to more realistic appreciation of human resource development’s activities, scope, and values. The paper makes an important contribution illustrating how curriculum design can transform instrumentalism into logically, emotionally, and intuitively based career engagement. Further, human resource development is a study and career area little mentioned in higher education or careers literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter investigates one instance of ‘morality-in-action’, which transpires when children describe their troubles to the adult counsellors at Kids Help Line, an Australian national helpline that deals specifically with callers aged approximately 5-18 years. We focus, in particular, on how a young female caller who has forged a medical certificate in relation to a problem with school attendance, determines both what to report, and how this should be disclosed. Throughout the call, the moral implications of the troubles talk are delicately managed by both caller and counsellor. The call takes the form of an extended story (Labov & Waletzky, 1997) that includes a preface (‘I have some problems at school’), an orientation (“I was sick, went to the doctor, stayed home”), a complicating action (“I went back to school and photocopied my certificate from last time”), result (“I got caught”) and evaluation (“I don’t know why it happened”). As the account unfolds, we observe how both the student and counsellor seek to make sense of these actions. While this account is partly about deception, both the caller and counsellor delicately sidestep naming this action, precluding this implication. For example, the counsellor lets stand the caller’s main assessment of the trouble. He simply asks, “so what happened then,” when the caller reports that her forgery was discovered. The caller, from the very beginning of the call, seeks to find out why she could have done this, “you see I don’t know why it happened”. As the call unfolds, the counsellor follows the opening provided by the caller and they put forward motives for consideration. By agreeing that the motives are to be explored, the act takes on a character other than deception.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia there is growing interest in a national curriculum to replace the variety of matriculation credentials managed by State Education departments, ostensibly to address increasing population mobility. Meanwhile, the International Baccalaureate (IB) is attracting increasing interest and enrolments in State and private schools in Australia, and has been considered as one possible model for a proposed Australian Certificate of Education. This paper will review the construction of this curriculum in Australian public discourse as an alternative frame for producing citizens, and ask why this design appeals now, to whom, and how the phenomenon of its growing appeal might inform national curricular debates. The IB’s emergence is understood with reference to the larger context of neo-liberal marketization policies, neo-conservative claims on the curriculum and middle class strategy. The paper draws on public domain documents from the IB Organisation and newspaper reportage to demonstrate how the IB is constructed for public consumption in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on a study of students choosing the International Baccalaureate Diploma (IBD) over state-based curricula in Australian schools. The IBD was initially designed as a matriculation certificate to facilitate international mobility. While first envisaged as a lifestyle agenda for cultural elites, such mobility is now widespread with more people living ‘beyond the nation’ through choice or circumstance. Beck (2007) and others highlight how the capacity to cross national borders offers a competitive edge with which to strategically pursue economic and cultural capital. Beck’s ‘border artistes’ are those who use national borders to their individual advantage through reflexive strategy. The study explored the rationales and strategy behind the choice of the IBD curriculum expressed by students in a focus group interview and an online survey. This paper reports on their imagined transnational routes and mobile orientations, and how a localised curriculum limits their imagined mobile futures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although transformative learning theory remains one of the most influential theories in the field of adult education, studies on fostering transformative learning, particularly in groups and in the workplace, remain sparse. This article summarises some evidence of transformational learning that influenced changes to practice, processes, and the organisational culture in a case study. It is based on a cohort of 12 worker-learners enrolled in a Graduate Certificate in Education (Executive Leadership) course offered by an Australian university (Queensland University of Technology). Data for this article were drawn from interviews with 10 participants, a focus group with 6 of them, their assessment presentations, and reflective notes of the course facilitators. Also included here are the effects on transformational learning of Taylor’s five elements of work-based learning design, Fuller and Unwins’ features of expansive learning, and Billett’s workplace pedagogies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The English examination system provides a market in which a limited number of providers are accredited to offer curriculum-based examinations in many subject areas and at several levels. The most significant are the General Certificate of Secondary Education (GCSE) and the General Certificate of Education, Advanced (A level). Because these examinations are used for high-stakes purposes, including higher education and employment selection for individuals and programme evaluation for institutions, it is desired that scores from various exams be ‘comparable’ in several respects: across syllabuses and examination boards within a subject area, across years, and even across subject areas. Just how to accomplish this goal has been a topic of continual research and debate for over 50 years, through many changes of examination and institutional structures. But ever year, tens of thousands of scores must be reported, and every year, users expect them to ‘be comparable’ and use them as if they are.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper will explore how a general education can contribute successfully to vocational outcomes using both Participatory Action Research (PAR) and Program Theory methodology. The paper will focus on the development aspects of ‘marrying’ vocational and general education including engagement processes, student, teacher, institute and employer preparation and the pathway possibilities that emerge. Successful cases presented include the: Healthy Futures program (pathways into the Health and Allied industries); Accounting Pathways program (simultaneously studying a general Accounting subject and a Certificate III vocational qualification); and Sustainable Sciences initiative (development of a vocational qualification that focuses on the emerging renewable energy industry and is linked to school science programs). The case studies have been selected because they are unique in character and application and can be used as a basis for future program development in other settings or curriculum areas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.