نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :Psi Chi Journal of Psychological Research 2017

Journal: :The Bulletin of the American Academy of Psychiatry and the Law 1984
T G Gutheil R Magraw

Law and psychiatry operate through differing models of reasoning, understanding, even of reality. I For the clinician first encountering the legal system, the fundamental concept of the law perhaps most difficult to grasp is the nature of the adversary process. Whether such a first encounter occurs during a commitment proceeding on a manifestly psychotic patient, in the preliminaries or disposi...

2007
Matthias Franz Bernd Meyer Andreas Pashalidis

A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information that would enable an adversary to link these items. The adversary could, however, take advantage of hints from the context in which the system operates. In this paper, we introduce a new metric that enables one to quant...

2014
Muhammad Sabir Idrees Yves Roudier Ludovic Apvrille

Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a securit...

Journal: :Computers & Security 2013
Kristin E. Heckman Michael J. Walsh Frank J. Stech Todd A. O'Boyle Stephen R. DiCato Audra F. Herber

In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...

2011
Moritz Y. Becker Masoud Koleini

Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.

ژورنال: حقوق پزشکی 2020
Abbaslu, Bakhtiar, Ebrahimian, Nejatollah, Ghaffari, Sara, Ghasemi, Mohsen,

Compensation for damages caused by medical accidents is one of the important issues that have led to the transformation of social life into responsibility. The increasing number of accidents caused by medical practices and the consequent increase in casualties to patients makes it more than necessary to investigate the issue. While the legal system of some countries, including France, has taken...

2009
Changsheng Li

In order to promote efficiency and realize democracy ideal, Italy transplanted adversary system in 1988. Because of rampancy of organized crimes and compulsory prosecution system and material truth ideal, reformer’s effort was nibbled away by constitutional court of Italy. In 1999, the legislature of Italy amended Article 111 in Constitution which formed the constitutional basis of adversary sy...

2002
Marc Rennhard

Several MIX-based systems offering anonymity have been operational. They are usually based on a relatively small set of static, well known and highly reliable nodes with good performance and connectivity that offer the MIX functionality. Due to the small number of nodes in such a system, they must be made very resistant against traffic analysis attacks by exchanging lots of cover traffic, resul...

ژورنال: پژوهشنامه مالیات 2019
, ,

Today, one of the most important challenges of tax system is tax evasion of the taxpayers, which is an obstacle to the proper administration of the country. There are many ways to prevent tax evasion, one of which is the legal remedy for issuance under Article 161 of the Direct Taxes Terms and Conditions. This important legal entity can prevent tax evasion and prevent tax fraud by seizing the p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید