Authorized Economic Operator

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using trust and reputation in government-to-business relationships: the authorized economic operator (AEO) as an example

This paper regards the government-to-business (G2B) relationship as a principal/agent relationship with asymmetric information. It brings about monitoring costs for the government, bonding costs for the businesses and a residual loss for society. In the case of government regulation these costs can be seen as transaction costs, which can be minimized in a trust-based design of the regulation. W...

متن کامل

Fludara Authorized Text

WARNING: FLUDARA FOR INJECTION should be administered under the supervision of a 6 qualified physician experienced in the use of antineoplastic therapy. FLUDARA FOR 7 INJECTION can severely suppress bone marrow function. When used at high doses in dose8 ranging studies in patients with acute leukemia, FLUDARA FOR INJECTION was associated 9 with severe neurologic effects, including blindness, co...

متن کامل

Stochastic Economic Growth: An Operator-Theoretic Approach

For many years the trend in macroeconomics has been towards models which are both explicitly stochastic and explicitly dynamic. With these models, researchers seek to replicate and explain observable properties of the major economic time series. One manifestation of this trend towards stochastic dynamic modeling has been increasing use of the inherently dynamic models developed in the field of ...

متن کامل

Authorized Keyword Search on Encrypted Data

Cloud computing has drawn much attention from research and industry in recent years. Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those data may contain sensitive information, it should be encrypted before outsourced to cloud servers. In order to ensure that only authorized users can search and further access the encrypted data, two important capabilitie...

متن کامل

Authorized Tracking and Tracing for RFID Tags

Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is used for identifying a person. However, the movements and current locations of goods and a person’s activity profiles ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Economics and Management

سال: 2016

ISSN: 2475-8868

DOI: 10.12783/dtem/iceme-ebm2016/4124