نتایج جستجو برای: ultra vires acts regarding third parties become valid
تعداد نتایج: 1000902 فیلتر نتایج به سال:
In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to m...
A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. Many threshold cryptographic schemes have been proposed so far, but fairness is not generally considered in this earlier work. In this paper, we present fair threshold decryption schemes, where either al...
BY THIRD PARTIES (NON-PARENTS) Ronald W. Nelson Rose & Nelson Overland Park, Kansas
The enterprise software industry faces dynamic market environments. Customers are unpredictable, and many different factors influence a sale. Software as such is frequently perceived as being a sort of 'black box'. In this paper we examine the different factors that influence new product adoption and diffusion in the enterprise software market, where we especially look at the role of third part...
The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...
Reducing Third Parties in the Network through Client-Side Intelligence
BACKGROUND Research on organizational injustice has mainly focused on the victim's perspective. This study attempts to contribute to our understanding of third parties' perspective by empirically testing a model that describes third party reactions to mistreatment of employees. METHOD Data were obtained from a sample (N = 334) of Spanish employees from various organizations, nested into 66 wo...
This paper presents a theory of informative communications among agents that allows a speaker to communicate to a hearer truths about the state of the world; the occurrence of events, including other communicative acts; and the knowledge states of any agent — speaker, hearer, or third parties — any of these in the past, present, or future — and any logical combination of these, including formul...
The Portuguese Constitution, in article 22, instituted the general principle of tort liability of the State and other public law entities. Consequently, ordinary legislation established the tort liability of the State into the Portuguese Legal Order, by means of Decree-Law 48051, of 1967. This decree, which was criticised extensively, was amended by virtue of Law 67/2007, of 31 December, establ...
This paper presents a theory of informative communications among agents that allows a speaker to communicate to a hearer truths about the state of the world; the occurrence of events, including other communicative acts; and the knowledge states of any agent — speaker, hearer, or third parties — any of these in the past, present, or future — and any logical combination of these, including formul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید