نتایج جستجو برای: refusing to accept repudiation

تعداد نتایج: 10614899  

2005
R Butler

Suppliers suffer losses when customers repudiate B2B order transactions in open account systems. Appropriate internal control measures should be implemented to address repudiation. According to the King Report on Corporate Governance for South Africa (2002), the responsibility for internal control lies with the management of a company. This article aims to assist management in reducing the risk...

2000
Peer Hasselmeyer Markus Schumacher Marco Voss

Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept of leasing. Leases model time-constrained access granting and are used for distributed garbage collection. In this position paper we propose an extension to the lease concept that allows associating costs with resource ...

2004
Ibrahim Hajjeh Ahmed Serhrouchni

SSL/TLS is currently the most deployed security protocol on the Internet. SSL/TLS provides end-to-end secure communications between two entities with authentication and data protection. However, what is missing from the protocol is a way to provide the non-repudiation service. In this paper, we describe a generic implementation of the non-repudiation service as an optional module in the SSL/TLS...

2001
Giampaolo Bella Lawrence C. Paulson

A non-repudiation protocol of Zhou and Gollmann [18] has been mechanically verified. A non-repudiation protocol gives each party evidence that the other party indeed participated, evidence sufficient to present to a judge in the event of a dispute. We use the theorem-prover Isabelle [10] and model the security protocol by an inductive definition, as described elsewhere [1, 12]. We prove the pro...

Journal: :Journal of Economic Behavior & Organization 2003

ژورنال: پیاورد سلامت 2014
ابوالقاسم گرجی, حسن, محسنی, محمد, اسدی, حشمت اله , براتی مارنانی, احمد, حسومی, مجتبی, رودباری , مسعود,

 Background and Aim: Readiness to face changes and transformation in health fields is one of the main factors in health organizations’ success. The main purpose of the present study was to determine the relation between culture and readiness to accept transformation in single-specialty hospitals. Materials and Methods: Readiness to face changes and transformation in health fields is on...

Journal: :Revista clinica espanola 2014
G L Bock

2000
Steve Kremer Olivier Markowitch

We present a multi-party non-repudiation protocol, based on a group encryption scheme. We define multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems. This is the first effort to generalize nonrepudiation to the multi-party case. Our definitions and the resulting protocol are more general than the ones given in the...

2005
Almudena Alcaide Juan E. Tapiador Antonio Izquierdo Manzanares José María Sierra

Recently, Nenadić et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others. In this paper, we illustrate how an extended logic of beliefs can be helpful to analyze in a formal manner these sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید