نتایج جستجو برای: third parties

تعداد نتایج: 269630  

Journal: :The Mississippi Valley Historical Review 1959

Azin SM, Omani Samani R

Background: ART contracts involving third parties have been created while clinical reproductive treatments are globally widespread. Iran is pioneer in applying these treatments in middle-east due to shii’at jurisprudence prescribing them. This key role in region, has raised Iranian jurists’ responsibility in developing a legal system regarding administration of ART. The most significant part of...

Journal: :Hokengakuzasshi (JOURNAL of INSURANCE SCIENCE) 2019

2007
Alexander Iliev Sean W. Smith

Many security protocols refer to a trusted third party (TTP) as an ideal way of handling computation and data with conflicting stakeholders. Subsequent discussion usually dismisses a TTP as hypothetical or impractical. However, the last decade has seen the emergence of hardware-based devices like the IBM 4758 that, to high assurance, can carry out computation unmolested; TPM-based systems like ...

Journal: :The Journal of applied psychology 2009
Lei Lai Denise M Rousseau Klarissa Ting Ting Chang

Idiosyncratic deals (i-deals for short) are personalized employment arrangements negotiated between individual workers and employers and intended to benefit them both (D. M. Rousseau, 2005). Coworkers' acceptance of another's i-deal can ultimately impact its overall effectiveness for the organization. By using a network approach to the study of work group dynamics, this research addresses the c...

2005
BRING PEACE DAVID CARMENT DANE ROWLANDS Patrick Moynihan

FROM a legal and practical point of view, separation is never easy. On the one hand, there is the perceived need to support struggling minorities who demand self determination as an inalienable right. This impulse is demonstrated by the fundamental role of the 1947 UN Human Rights Sub-commission on the Prevention of Discrimination and Protection of Minorities, associated with the post–Second Wo...

2004
Alexander W. Dent Geraint Price

Trust is a key component in any ubiquitous computing system. Users have to trust the devices to be secure, devices have to authenticate the users in order to trust their inputs and devices have to trust each others’ identity and authorisation. A central question in dealing with trust is how to distribute copies of a user’s public key in such a way that other users can verify that it does, indee...

Journal: :Maryland law review 1989
Donald H J Hermann Rosalind D Gagliano

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید