نتایج جستجو برای: third party

تعداد نتایج: 267981  

Journal: :Ethics 2021

It is commonly claimed that when X coerces Y into consenting to Z ?-ing, Y’s consent invalid, and only permitted ? if this reduces harm or increases optionality for Y. This article demonstrates in such cases valid choosing between options include all those has a duty offer no autonomy-reducing not When these conditions are met, acts permissibly ?-ing even does reduce increase optionality.

Journal: :Economics of Governance 2022

This paper presents and solves a model of ethnically motivated warfare which treats annexations as the explicit outcomes secessions. An ethnic group within one country may want to engage in secession order join its peers annexing country. The decides whether or not support separatist conflict. I use this discuss how equilibrium behavior depends on economies scale public good provision, heteroge...

2010
Alec Wolman Stefan Saroiu Paramvir Bahl

Patients are notoriously inconsistent with taking their medications. Doctors and insurance companies have an incentive to monitor and collect data on whether medical patients and insurance customers are following prescriptions and maintaining a healthy lifestyle. A convenient way of gathering such data is using smartphones. For example, accelerometer readings can be used to reveal how physicall...

2007
Stephen Blessing Stephen B. Gilbert Steven Ourada Steven Ritter

The main goal of the work presented here is to allow for the broader dissemination of intelligent tutoring technology. To accomplish this goal, we have two clear objectives. First, we want to allow different types of people to author model-tracing intelligent tutoring systems (ITSs) than can now do so. Second, we want to enable an author to create a tutor for software that was not initially des...

2008
Nathan Griffiths Arshad Jhumka Anthony Dawson Richard Myers

In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, the absence of any trusted third party in such networks may result in nodes deviating from the routing protocol for selfish or malicious reasons. The concept of trusted routing has been promoted to handle the problems selfish and mali...

1998
Dogan Kesdogan Peter Reichl Klaus Junghärtchen

One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further th...

2002
Dennis Kügler

While anonymous payments are necessary for privacy reasons, they can as well be misused for criminal activities: Anonymous electronic cash can be used to conduct crimes that would be impossible with physical cash. As potential misuse of anonymity cannot be tolerated, the allowed anonymity has to be restricted. Payment systems with restricted anonymity are commonly based on the concept of a trus...

2017
Deepak Kumar Zane Ma Zakir Durumeric Ariana Mirian Joshua Mason J. Alex Halderman Michael Bailey

Over the past 20 years, websites have grown increasingly complex and interconnected. In 2016, only a negligible number of sites are dependency free, and over 90% of sites rely on external content. In this paper, we investigate the current state of web dependencies and explore two security challenges associated with the increasing reliance on external services: (1) the expanded attack surface as...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید