74 research outputs found

    Supporting School Resilience: A Study on a Sample of Teachers after the 2016/2017 Seismic Events in Central Italy

    Get PDF
    Between 2016 and 2017, a series of high-intensity earthquakes devastated Central Italy, with great repercussions on the lives of people and local communities. The article reports the results of a research concerning the impact of the catastrophe on the school world, on the teaching profession and on the behavior of the students. Special attention was paid to teachers’ resilient skills and their professional responses in catastrophic situations. For the survey, we used a questionnaire and a test for the study of resilience, administered to a sample of 477 teachers from Lazio and Abruzzo. The results showed that the experience of the catastrophe has a significant influence on teaching professionalism, professional motivation, levels of resilience and behaviors observed in the students. In the light of the results, it is possible to state that in emergency situations teacher training on help relationship and resilience becomes a crucial factor in supporting their professionalism, with important repercussions on students and on school organization

    Il Registro .it e la comunicazione esterna

    Get PDF
    In ItalianQuesto documento si propone di descrivere gli obiettivi e gli strumenti delle nuove attivit? di comunicazione del Registro, evidenziando anche le ricadute interne, che hanno interessato il Registro a partire dal 2006. Nella prima parte viene descritto il contesto di partenza e gli obiettivi di comunicazione del Registro; di seguito vengono presentate le principali tappe che hanno portato all\u27elaborazione del bando e del capitolato di gara europea per l\u27affidamento della campagna di comunicazione e al successivo incarico all\u27Agenzia Light- Advertising e Marketing srl in collaborazione con l\u27istituto di indagini e statistiche Pragma Srl. Vengono infine descritte le attivit? e i progetti gi? realizzati, soffermandosi in particolare sui risultati del primo lancio della campagna di comunicazione

    La formazione interna nel Registro .it Verso il sincrono

    Get PDF
    In ItalianL\u27attivita\u27 di formazione interna del Registro .it ha lo scopo di mantenere una elevata professionalita\u27 del personale del Registro in un ambito lavorativo e culturale caratterizzato da continue evoluzioni tecnologiche e procedurali ed e\u27 certificata secondo lo standard ISO9001:2008. L\u27Unita\u27 Relazioni Esterne Media e Comunicazione ha il compito, sin dai primi anni del 2000, di gestire e organizzare questa attivita\u27. In questa pubblicazione viene esposta e analizzata in dettaglio l\u27attivita\u27 formativa interna relativa all\u27anno 2009

    Compositional verification of integrity for digital stream signature protocols

    Get PDF
    We investigate the application of concurrency theory notions as simulation relations and compositional proof rules for verifying digital stream signature protocols. In particular, we formally prove the integrity of the Gennaro-Rohatgi protocols in [7]. As a peculiarity, our technique is able to check a protocol with an unbounded number of parallel processes. We argue also that our approach may be applied to a wider class of stream signature protocols

    La realizzazione del nuovo sito web del Registro .it

    Get PDF
    In ItalianQuesta nota riguarda la riprogettazione del sito web del Registro dei nomi a dominio di internet con estensione .it Il progetto del nuovo sito web si inquadra in un\u27ampia iniziativa di comunicazione integrata (intesa come comunicazione interna e esterna), che si sta svolgendo secondo un piano di comunicazione definito alla fine del 2007. Nel documento viene descritta brevemente la campagna di comunicazione all\u27interno della quale si colloca la realizzazione del nuovo sito web del Registro e vengono ripercorse le fasi del progetto, evidenziando anche il percorso "storico", il percorso logico, i vincoli organizzativi e le modalit? di lavoro, per chiarire il perch? di alcune scelte e la cronologia di alcuni processi. Viene anche illustrato il lavoro fatto per definire il target e gli obiettivi, le unit? logiche che sottostanno alla navigazione, il tono della comunicazione, la scelta e l\u27elaborazione dei contenuti e vengono forniti alcuni esempi realizzativi

    MOC via TOC using a Mobile Agent framework

    Get PDF
    A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Match On Card (MOC) smartcards, which can compute a biometric match onboard, by using cheap Template on Card (TOC) smartcards, which only store a biometric template. The biometric match is performed by a module running on the user\u27s workstation, authenticated by a mobile agent coming from a reliable server. The protocol uses today\u27s cryptographic tokens without requiring any HW/SW modi?cation

    Formal analysis of some secure procedures for certificate delivery

    Get PDF
    The paper describes and formally analyzes two communication protocols to manage the secure emission of digital certificates. The formal analysis is carried out by means of a software tool for the automatic erification of cryptographic protocols with finite behaviour. The tool is able to discover, at a conceptual level, attacks against security procedures. The methodology is general enough to be applied to several kinds of cryptographic procedures and protocols. It is opinion of the authors that this survey contributes towards a better understanding of the structure and aims of a protocol, both for developers, analyzers and final users

    Fine Grained Access Control for Computational Services

    Get PDF
    Grid environment concerns the sharing of a large set of resources among entities that belong to Virtual Organizations. To this aim, the environment instantiates interactions among entities that belong to distinct administrative domains, that are potentially unknown, and among which no trust relationships exist a priori. For instance, a grid user that provides a computational service, executes unknown applications on its local computational resources on behalf on unknown grid users. In this context, the environment must provide an adequate support to guarantee security in these interactions. To improve the security of the grid environment, this paper proposes to adopt a continuous usage control model to monitor accesses to grid computational services, i.e. to monitor the behaviour of the applications executed on these services on behalf of grid users. This approach requires the definition of a security policy that describes the admitted application behaviour, and the integration in the grid security infrastructure of a component that monitors the application behaviour and that enforces this security policy. This paper also presents the architecture of the prototype of computational service monitor we have developed, along with some performance figures and its integration into the Globus framework

    "Italia: boom dei domini Internet"

    Get PDF
    In ItalianQuesta rassegna stampa e web raccoglie una selezione di articoli pubblicati da quotidiani, agenzie di stampa e siti Internet a seguito della diffusione del comunicato stampa Cnr relativo all\u27insediamento del direttore dell\u27Istituto di Informatica e Telematica del Cnr, Domenico Laforenza, avvenuto a luglio 200

    An Asymmetric Fingerprint Matching Algorithm for Java Card

    Get PDF
    A novel fingerprint matching algorithm is proposed in this paper. The algorithm is based on the minutiae local structures, that are invariant with respect to global transformations like translation and rotation. Match algorithm has been implemented inside a smartcard over the Java Card? platform, meeting the individual\u27s need for information privacy and the overall authentication procedure security, since the card owner biometric template never leaves the private support device and the match is computed inside a secure environment. The main characteristic of the algorithm is to have an asymmetric behaviour between correct positive matches (between two same fingerprint samples) and correct negative matches (between two different fingerprint images): in the first case, the match procedure stops as it finds that images belong to the same fingerprint, gaining high speed efficiency, while in the second case the verification process lasts longer, exploring all the minutiae pairings. The performances in terms of authentication reliability and speed have been tested on the databases from the Fingerprint Verification Competition 2002 edition (FVC2002) by taking in account the different hardware to run the algorithms. Moreover, our procedure has showed better reliability results when compared on a common database with a related algorithm developed specifically for Java Card?
    corecore