738 resultados para Certificate
Resumo:
The use of professional competency standards to assess postgraduate nursing student’s clinical performance has been in place since 2004, at the Queensland University of Technology, School of Nursing & Midwifery (SONAM) when the Graduate Certificate in Emergency Nursing degree commenced. Emergency nursing students were assessed in their workplace, using a Clinical Performance Appraisal Tool or CPAT which was based on the Australian College of Critical Care Nurses (ACCCN) Competency Standards. With the subsequent formation of a separate Emergency Nursing Course advisory group in 2007, there was a review of clinical assessment course component. The release of the 2008 CENA revised Practice Standards for the Emergency Nursing Specialist’s, led to the emergency nursing course advisory committee supporting the integration of the CENA practice standards for assessment of emergency nurses in preference to the less relevant ACCCN competency standards. The SONAM emergency nursing study area team commenced the phasing in and progression of the CENA practice standards across the two Graduate Certificate units, and Graduate Diploma and Master of Nursing (emergency) clinical major options in 2009. As some units undertaken in the degree are available to nurses in other disciplines a separate CPAT was devised for the clinical assessments according to speciality context. The team has had to carefully consider how the professional standards are integrated into the teaching and assessment of the unit and not just applied instead of the ACCCN competency standards. Professional standards for the emergency context has also helped tailor course content and learning outcomes to be relevant across a number of emergency nursing contexts in Australia. The assessment of the CPAT is undertaken at the workplace by QUT appointed clinical lecturers. Clinical lecturers need to apply and have suitable postgraduate qualification to undertake the position. The clinical lecturer support role is well established at QUT. The integration of the new CENA practice standards has necessitated a review of the postgraduate assessment of emergency nurses. A clinical lecturer workshop has been organised to review role, scope and how to utilise the new look CENA based CPAT, clinical assessment format.
Resumo:
Only a few years ago there were only a handful of buildings in Australia, mainly leased by or from the Commonwealth Government to which a green lease might have application. Now with the passing of the Building Energy Efficiency Disclosure Act 2010 (Cth) all commercial office premises in excess of 2000 square metres have 12 months from 1 November 2010 to obtain a Building Energy Efficiency Certificate as part of Stage 1 of the Federal Government’s National Framework for Energy Efficiency This significant change has focused attention on changes required to the conditions of leases where the building has a NABERS rating. This article considers material from the United Kingdom, the United States and Canada where there are similar policy changes in play and makes suggestions as to how certain clauses of a standard lease of a commercial office block may be altered to meet this new regime.
Resumo:
To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
The failure of medical practitioners to consistently discharge their obligation to report sudden or unnatural deaths to coroners has rightly prompted concern. Following recent public scandals, coroners and health authorities have increasingly developed procedures to ensure that concerning deaths are reported to coroners. However, the negative consequences of deaths being unnecessarily reported have received less attention: unnecessary intrusion into bereavement; a waste of public resources; and added delay and hindrance to the investigation of matters needing a coroner’s attention. Traditionally, coroners have largely, unquestioningly assumed jurisdiction over any deaths for which a medical practitioner has not issued a cause of death certificate. The Office of the State Coroner in Queensland has recently trialled a system to more rigorously assess whether deaths apparently resulting from natural causes, which have been reported to a coroner, should be investigated by the coroner, rather than being finalised by a doctor issuing a cause of death certificate. This article describes that trial and its results.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
This paper investigates the teaching and learning of fractions to Indigenous adult learners in a Civil Construction Certificate Course. More specifically it explores why the use of materials is critical to building knowledge and understanding. This focus is important for two reasons. First, it allows for considerations of a trainer’s approach for teaching fractions and, second it provides insights into how adult learners can be supported with representing their practical experiences of fractions to make generalisation thus building on their knowledge and learning experiences. The paper draws on teaching episodes from an Australian Research Council funded Linkage project that investigates how mathematics is taught and learned in Certificate Courses, here, Certificate 11 in Civil Construction. Action research and decolonising methods (Smith, 1999) were used to conduct the research. Video excerpts which feature one trainer and three students are analysed and described. Findings from the data indicate that adult learners need to be supported with materials to assist with building their capacity to know and apply understandings of fractions in a range of contexts, besides construction. Without materials and where fractions are taught via pen and paper tasks, students are less likely to retain and apply fraction ideas to their Certificate Course. Further they are less likely to understand decimals because of limited understanding of fractions.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
The Australian Civil Aviation Safety Authority (CASA) currently lists more than 100 separate entities or organisations which maintain a UAS Operator Certificate (UOC) [1]. Approved operations are overwhelmingly a permutation of aerial photography, surveillance, survey or spotting and predominantly, are restricted to Visual Line of Sight (VLOS) operations, below 400 feet, and not within 3 NM of an aerodrome. However, demand is increasing for a Remote Piloted Aerial System (RPAS) regulatory regime which facilitates more expansive operations, in particular unsegregated, Beyond Visual Line of Sight (BVLOS) operations. Despite this demand, there is national and international apprehension regarding the necessary levels of airworthiness and operational regulation required to maintain safety and minimise the risk associated with unsegregated operations. Fundamental to addressing these legitimate concerns will be the mechanisms that underpin safe separation and collision avoidance. Whilst a large body of research has been dedicated to investigating on-board, Sense and Avoid (SAA) technology necessary to meet this challenge, this paper focuses on the contribution of the NAS to separation assurance, and how it will support, as well as complicate RPAS integration. The paper collates and presents key, but historically disparate, threads of Australian RPAS and NAS related information, and distils it with a filter focused on minimising RPAS collision risk. Our ongoing effort is motivated by the need to better understand the separation assurance contribution provided by the NAS layers, in the first instance, and subsequently employ this information to identify scenarios where the coincident collision risk is demonstrably low, providing legitimate substantiation for concessions on equipage and airworthiness standards.
Resumo:
The BRAKE Driver Awareness Program provides evidence-based behaviour, risk, attitude and knowledge education for young drivers. BRAKE was founded during 2006 by Queensland Police Sergeant Rob Duncan and has been delivered to more than 35,000 senior secondary students since 2007. BRAKE is a participant directed program supported by resources provided at no cost. It includes eight parts able to be delivered in different configurations. BRAKE is endorsed by the Queensland Police and Queensland Ambulance Services. It is recognised by the Queensland Studies Authority as a Queensland Certificate of Education registered life skills course. This session is a must attend for secondary teachers, coordinators, staff in senior leadership positions and other stakeholders seeking a unique approach to adolescent road safety education. It will conclude with an opportunity to consider how BRAKE can be integrated into the senior secondary Health Education curriculum or pastoral care, social action and personal development programs.
Resumo:
This article considers the changes to the Swimming Pools Act 1992 (NSW)(Act) which established a State-wide online register of all private swimming pools in NSW requiring pool owners to register their pools by 19 November 2013. Amendments to the Act introduced changes to the conveyancing and residential tenancy regulations to require vendors and landlords to have a valid Compliance Certificate issued for their swimming pool before offering the property for sale or lease. This article provides a brief overview of the new sale and leasing requirements effective from 29 April 2014, focusing on its application to lot owners within strata and community title schemes and other owners of water front properties with pools on Crown Land Reserves.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
"What is Bluebird AR? Bluebird AR was the ABC's alternate reality drama set around the leak of Bluebird, a clandestine geoengineering initiative created by eco-billionaire Harrison Wyld. Proposing a fictional scenario set against a backdrop of real world possibilities, Bluebird AR took some of the conventions of the well-established alternate reality game (ARG) genre and pulled them into the relatively new area of online drama, to create a hybrid entertainment form best described as 'participatory drama'. With Bluebird AR's interactive narrative centred on the experimental science of geoengineering, the deliberate manipulation of the Earth's atmosphere to counteract global warming, the events and characters in the Bluebird story were entirely fictional but fused with reality online. Inhabiting a mixture of third party social media spaces and websites created by the ABC, the story incorporated real online articles, scientific journals, media and debate around geoengineering. In an Australian first, ABC Innovation launched Bluebird AR on 27 April 2010, with a 6 week live phase. Audience members were invited to play collectively to help 'unlock the drama' and push forward the emerging narrative, or passively watch the story unfold in real-time across the internet. Bluebird AR subverted ARG conventions with the high quality of its production and assets, and raised the stakes for online drama with its level of audience participation." © 2014 ABC "Introduction One of the most exciting creative challenges of producing Bluebird AR was formulating the broad array of visual styles and treatments required for the project's diverse range of content. Many assets also needed to translate well not only online but across other media, including television and print. With the project's producers keen to create a visually rich narrative with high production values from the outset, inspiration for the production design for various aspects of the Bluebird story began in the earliest pitching phase in September 2008. Particular visual treatments and styles for Bluebird's characters, their web spaces and real world possessions were formulated concurrently with the creation of their profiles. Ideas around how various clues and gameplay spaces might look and feel were also explored at this early stage. Bluebird AR's small but tight creative team produced 7 website designs and brands, motion graphics for title sequences and logo animations, rotoscope animation, 3D compositing and animation, 3D wireframes and schematics, countless Photoshop composites, and a vast array of character assets for the DC (including Kyle's Bluebird Labs security pass and resignation letter, Kruger's American and Russia passports and birth certificate, Harrison's divorce papers, and more)…" © 2014 ABC
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.