54 resultados para Revocation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sixth Judicial District Pilot Project treats probation violation hearings in the same manner as parole violation hearings. When a probationer is serving a suspended prison sentence, the project permits an administrative law judge to dispose of the case rather than requiring the District Court to adjudicate the violation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is with increasing frequency that States undertake unilateral acts. For that reason this article undertakes to demonstrate the development of unilateral acts of States in the heart of the International Law Commission of the United Nations - ILC. It analyzes unilateral and autonomous acts which can by themselves have juridical effects. In this sense, silence acquiescence and acceptance may have an influence in these acts.The ILC has studied this issue for ten years, analyzing its interpretation, the specific rules which are applicable, their modification, termination and the revocation of unilateral acts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Authentic documents referred to in justification of the text": v. 2, p. [335]-419.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado, Ciências Económicas e Empresariais, 18 Dezembro de 2015, Universidade dos Açores.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de mestrado em Direito dos Contratos e da Empresa

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In addition to their original sentence, persons convicted of sexual abuse, incest or sexual exploitation of a minor also receive a “special sentence” of ten years, or in some cases, life. In its prison population forecast, the Iowa Division of Criminal and Juvenile Justice Planning noted “an unexpectedly high rate of revocation among those released to the special sentence, particularly given past research that has shown Iowa sex offenders having very low rates of re-arrest and/or return to prison.”