نتایج جستجو برای: ultra vires acts regarding third parties become valid

تعداد نتایج: 1000902  

2013
Meixing Le Krishna Kant Sushil Jajodia

In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to m...

2009
Jeongdae Hong Jinil Kim Jihye Kim Matthew K. Franklin Kunsoo Park

A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. Many threshold cryptographic schemes have been proposed so far, but fairness is not generally considered in this earlier work. In this paper, we present fair threshold decryption schemes, where either al...

2011
Ronald W. Nelson

BY THIRD PARTIES (NON-PARENTS) Ronald W. Nelson Rose & Nelson Overland Park, Kansas

2003
Hans M. Moonen

The enterprise software industry faces dynamic market environments. Customers are unpredictable, and many different factors influence a sale. Software as such is frequently perceived as being a sort of 'black box'. In this paper we examine the different factors that influence new product adoption and diffusion in the enterprise software market, where we especially look at the role of third part...

1999
Uwe G. Wilhelm Sebastian Staamann Levente Buttyán

The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...

2017
Georgios Kontaxis

Reducing Third Parties in the Network through Client-Side Intelligence

Journal: :Psicothema 2013
Gabriela Topa Juan A Moriano José F Morales

BACKGROUND Research on organizational injustice has mainly focused on the victim's perspective. This study attempts to contribute to our understanding of third parties' perspective by empirically testing a model that describes third party reactions to mistreatment of employees. METHOD Data were obtained from a sample (N = 334) of Spanish employees from various organizations, nested into 66 wo...

Journal: :Artif. Intell. 2005
Ernest Davis

This paper presents a theory of informative communications among agents that allows a speaker to communicate to a hearer truths about the state of the world; the occurrence of events, including other communicative acts; and the knowledge states of any agent — speaker, hearer, or third parties — any of these in the past, present, or future — and any logical combination of these, including formul...

2013

The Portuguese Constitution, in article 22, instituted the general principle of tort liability of the State and other public law entities. Consequently, ordinary legislation established the tort liability of the State into the Portuguese Legal Order, by means of Decree-Law 48051, of 1967. This decree, which was criticised extensively, was amended by virtue of Law 67/2007, of 31 December, establ...

2004
Ernest Davis

This paper presents a theory of informative communications among agents that allows a speaker to communicate to a hearer truths about the state of the world; the occurrence of events, including other communicative acts; and the knowledge states of any agent — speaker, hearer, or third parties — any of these in the past, present, or future — and any logical combination of these, including formul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید