Showing 1 - 20 results of 1,644 for search '"Credential"', query time: 0.24s Refine Results
  1. 1

    Credentialing micro credentials by Gavin Moodie, Leesa Wheelahan

    Published 2022-06-01
    “… The core purpose of accrediting educational credentials is to establish their conformity with standards established for educational credentials in general, particularly those offered by other institutions and in other fields. …”
    Get full text
    Article
  2. 2

    On Credentials by Smith Barry, Loddo Olimpia Giuliana, Lorini Giuseppe

    Published 2020-08-01
    Subjects: “…credentials…”
    Get full text
    Article
  3. 3

    On Credentials by Giuseppe Lorini

    Published 2022-03-01
    Subjects: “…credentials…”
    Get full text
    Article
  4. 4

    The move to micro-credentials exposes the deficiencies of existing credentials by David Boud, Trina Jorre de St Jorre

    Published 2021-02-01
    “…The rush to short courses and use of micro-credentials prompted by responses to the pandemic has greatly accelerated a trend already underway. …”
    Get full text
    Article
  5. 5

    Application for credentials by Cork County Association, CCA

    Published 1969
    “…Printed form, headed 'National Consultative Conference: Civil rights in Northern Ireland, NUFTO Hall, February 23rd, 1969, 10.30am: application for credentials'.…”
    Get full text
    Ephemera
  6. 6

    Implementation of Nursing Credentials and Recredentials by the Credentials Subcommittee at X Distric Hospital by Sugito, Luky Dwiantoro, Anggorowati, Muhammad Hasib Ardani, Madya Sulisno

    Published 2023-02-01
    “…The results of the preliminary study indicated that the implementation of nursing credentials and recredentials by the credentials subcommittee in the hospital was not optimal. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Assessment, credential, or both? Higher education faculty’s design principles for micro-credentials by Anne Reed, Yiren Kong, Samuel Abramovich

    Published 2024-02-01
    “…Abstract The rise of small, skills-focused credentials, also known as micro-credentials, has garnered considerable attention in recent years. …”
    Get full text
    Article
  10. 10

    The Global Micro-credential Landscape: Charting a New Credential Ecology for Lifelong Learning by Mark Brown, Mairéad Nic Giolla Mhichíl, Elaine Beirne, Conchúr Mac Lochlainn

    Published 2021-07-01
    Subjects: “…Credentials, Micro-credentials, Digital Badges, Employability, Transversal Skills…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Micro-credentials for recognition of workplace learning by Elisa Martinez-Marroquin, Sally Male

    Published 2021-12-01
    “…We argue also that micro-credentials give an opportunity to better embed workplace informal learning into formal qualifications. …”
    Get full text
    Article
  17. 17
  18. 18

    Identity credential issuance with trusted computing by Abd Aziz, Norazah, Mazalan, Lucyantie

    Published 2009
    “…In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment.…”
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20