نتایج جستجو برای: refusing to accept repudiation
تعداد نتایج: 10614899 فیلتر نتایج به سال:
Suppliers suffer losses when customers repudiate B2B order transactions in open account systems. Appropriate internal control measures should be implemented to address repudiation. According to the King Report on Corporate Governance for South Africa (2002), the responsibility for internal control lies with the management of a company. This article aims to assist management in reducing the risk...
Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept of leasing. Leases model time-constrained access granting and are used for distributed garbage collection. In this position paper we propose an extension to the lease concept that allows associating costs with resource ...
SSL/TLS is currently the most deployed security protocol on the Internet. SSL/TLS provides end-to-end secure communications between two entities with authentication and data protection. However, what is missing from the protocol is a way to provide the non-repudiation service. In this paper, we describe a generic implementation of the non-repudiation service as an optional module in the SSL/TLS...
A non-repudiation protocol of Zhou and Gollmann [18] has been mechanically verified. A non-repudiation protocol gives each party evidence that the other party indeed participated, evidence sufficient to present to a judge in the event of a dispute. We use the theorem-prover Isabelle [10] and model the security protocol by an inductive definition, as described elsewhere [1, 12]. We prove the pro...
Background and Aim: Readiness to face changes and transformation in health fields is one of the main factors in health organizations’ success. The main purpose of the present study was to determine the relation between culture and readiness to accept transformation in single-specialty hospitals. Materials and Methods: Readiness to face changes and transformation in health fields is on...
We present a multi-party non-repudiation protocol, based on a group encryption scheme. We define multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems. This is the first effort to generalize nonrepudiation to the multi-party case. Our definitions and the resulting protocol are more general than the ones given in the...
Recently, Nenadić et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others. In this paper, we illustrate how an extended logic of beliefs can be helpful to analyze in a formal manner these sec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید