نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
Law and psychiatry operate through differing models of reasoning, understanding, even of reality. I For the clinician first encountering the legal system, the fundamental concept of the law perhaps most difficult to grasp is the nature of the adversary process. Whether such a first encounter occurs during a commitment proceeding on a manifestly psychotic patient, in the preliminaries or disposi...
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information that would enable an adversary to link these items. The adversary could, however, take advantage of hints from the context in which the system operates. In this paper, we introduce a new metric that enables one to quant...
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a securit...
In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...
Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.
Compensation for damages caused by medical accidents is one of the important issues that have led to the transformation of social life into responsibility. The increasing number of accidents caused by medical practices and the consequent increase in casualties to patients makes it more than necessary to investigate the issue. While the legal system of some countries, including France, has taken...
In order to promote efficiency and realize democracy ideal, Italy transplanted adversary system in 1988. Because of rampancy of organized crimes and compulsory prosecution system and material truth ideal, reformer’s effort was nibbled away by constitutional court of Italy. In 1999, the legislature of Italy amended Article 111 in Constitution which formed the constitutional basis of adversary sy...
Several MIX-based systems offering anonymity have been operational. They are usually based on a relatively small set of static, well known and highly reliable nodes with good performance and connectivity that offer the MIX functionality. Due to the small number of nodes in such a system, they must be made very resistant against traffic analysis attacks by exchanging lots of cover traffic, resul...
Today, one of the most important challenges of tax system is tax evasion of the taxpayers, which is an obstacle to the proper administration of the country. There are many ways to prevent tax evasion, one of which is the legal remedy for issuance under Article 161 of the Direct Taxes Terms and Conditions. This important legal entity can prevent tax evasion and prevent tax fraud by seizing the p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید