954 resultados para Revocation of mandate
Resumo:
Présentation à la Annual Law & Economics Conference 2007, Université de Bologne.
Resumo:
It is with increasing frequency that States undertake unilateral acts. For that reason this article undertakes to demonstrate the development of unilateral acts of States in the heart of the International Law Commission of the United Nations - ILC. It analyzes unilateral and autonomous acts which can by themselves have juridical effects. In this sense, silence acquiescence and acceptance may have an influence in these acts.The ILC has studied this issue for ten years, analyzing its interpretation, the specific rules which are applicable, their modification, termination and the revocation of unilateral acts.
Resumo:
Número dedicado ao Novo Código de Processo Civil.
Resumo:
"Authentic documents referred to in justification of the text": v. 2, p. [335]-419.
Resumo:
La revocatoria de mandato es una herramienta de participación política ciudadana en Colombia establecida hace ya más de veinte años. Sin embargo, y a pesar de que ha sido implementada en 146 casos, ningún gobernante ha sido revocado o ratificado por este medio en el país. Este hecho ha motivado varias investigaciones que se han centrado en los problemas operativos, normativos y las dificultades en la implementación de la herramienta. Este trabajo busca ir más allá y centrarse en los efectos políticos y sociales que afectan, de manera positiva o negativa, esta herramienta de participación política ciudadana. Siendo una herramienta que involucra directamente a los ciudadanos con la política local, las acciones que se lleven a cabo durante todo el proceso pueden afectar a la población. Esto se puede afirmar si se tiene en cuenta que la historia política colombiana ha estado permeada por el autoritarismo y el clientelismo, donde actores poderosos a nivel local, pertenecientes a oligopolios políticos, se encuentran legitimados por características históricas para adelantar acciones que afectan la seguridad, tranquilidad e integridad de la población. El análisis involucra tres procesos de revocatoria de mandato en el departamento de Boyacá durante el periodo 2008-2011: Tunja, Samacá y Somondoco; resaltando el papel que cada actor juega en el respectivo proceso de revocatoria, así como sus motivaciones para ser parte de él y las acciones que adelanten para asegurar el éxito o fracaso de esta herramienta. Para ello se utilizó una metodología cualitativa, consistente en monitoreo de medios y entrevistas semiestructuradas a los diferentes actores de los procesos, lo cual permite reconstruir los casos de estudio.
Resumo:
Software needs to be accessible for persons with disabilities and there are several guidelines to assist developers in building more accessible software. Regulation activities are beginning to make the accessibility of software a mandatory requirement in some countries. One such activity is the European Mandate M 376, which will result in a European standard (EN 301 549) defining functional accessibility requirements for information and communication technology products and services. This paper provides an overview of Mandate M 376 and EN 301 549, and describes the requirements for software accessibility defined in EN 301 549, according to a feature-based approach
Resumo:
Software needs to be accessible for persons with disabilities and there are several guidelines to assist developers in building more accessible software. Regulation activities are beginning to make the accessibility of software a mandatory requirement in some countries. One such activity is the European Mandate M 376, which will result in a European standard (EN 301 549) defining functional accessibility requirements for information and communication technology products and services. This paper provides an overview of Mandate M 376 and EN 301 549, and describes the requirements for software accessibility defined in EN 301 549, according to a feature-based approach.
Resumo:
A continuation of the narrative begun in the author's "Rise of the Huguenots" and concluded in his "Huguenots and the revocation of the Edict of Nantes."
Resumo:
The narrative is continued in the author's "Huguenots and Henry of Navarre", and concluded in his "Huguenots and the revocation of the Edict of Nantes".
Resumo:
This preliminary study of the drivers involved in major accidents in Iowa and their subsequent examination was undertaken by the State Planning Board. All personal injury and fatal accidents, and those property damage accidents of such serious nature as to indicate the suspension or revocation of the drivers license, occurring in the state from 1935 to April 1036 are included.
Resumo:
We measure the impact of warnings of expropriation and of forced divestments of pri- vate property on the stock prices of the parent company. We use a unique database of 116 events in 12 countries from 2005 to 2013. Our results show signi cant negative effects on the stock prices of different kinds of warnings; the largest effect is when the warning takes the form of a transitory permit revocation. In the case of forced divestments, we nd a signi cant negative impact when there is a permanent revocation of a permit. However, nationalizations seem to generate a positive market reaction.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Physical access control systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. In this paper we discuss the shortcomings of existing approaches to the administration of physical access control in complex environments. At the heart of the problem is the current dependency on human administrators to reason about the implications of the provision or the revocation of staff access to an area within these facilities. We demonstrate how utilising Building Information Models (BIMs) and the capabilities they provide, including 3D representation of a facility and path-finding can reduce possible intentional or accidental errors made by security administrators.
Resumo:
Este trabalho tem como escopo analisar e delimitar o conceito, espécies, requisitos e consequências da revisibilidade das licenças ambientais. Não raras vezes, empreendedores, administradores públicos, juízes e todos os demais operadores do direito se veem em situações que contrapõem a estabilidade das relações jurídicas e a confiança legítima do comportamento estatal à necessidade de proteger o meio ambiente equilibrado para as presentes e futuras gerações. A revisão de licenças ambientais ainda vigentes é exatamente um dos campos onde essa análise tem espaço. Seja em circunstâncias provisórias ou definitivas, seja advinda de uma nulidade anterior ou de um fato ulterior, em determinadas hipóteses a iminência de dano ambiental faz com que o poder público não possa esperar o término da vigência do ato autorizativo para agir. Ao longo do texto, fixam-se as premissas para examinar cinco espécies de revisão: suspensão, modificação, cassação, invalidação e revogação das licenças ambientais, todas orientadas por algumas ideias comuns, mas cada uma delas com suas especificidades. Apresentam-se, outrossim, alguns contrapontos ao cabimento dessas medidas, notadamente a garantia constitucional de proteção do direito adquirido, não como objeção indiscriminada à atuação estatal, mas como forma de limitação dessa nos estreitos contornos traçados pelos princípios envolvidos. Ao final, trata-se também das consequências que podem advir desse ato revisor, em especial no que tange ao eventual cabimento de indenização ao empreendedor por ele afetado.
Resumo:
My thesis presents an examination of Ce que c'est que la France toute Catholique (1686) by Pierre Bayle, a prominent figure in the Republic of Letters and the Huguenot Refuge in the seventeenth century. This pamphlet was the first occasional text that Bayle published following the Revocation of the Edict of Nantes in which the religious toleration afforded to the Huguenot minority in France was repealed, a pivotal moment in the history of early modern France. In my thesis, I analyse the specific context within which Bayle wrote this pamphlet as a means of addressing a number of issues, including the legitimacy of forced conversions, the impact of the religious controversy upon exchanges in the Republic of Letters, the nature of religious zeal and finally the alliance of Church and state discourses in the early modern period. An examination of this context provides a basis from which to re-interpret the rhetorical strategies at work within the pamphlet, and also to come to an increased understanding of how, why and to what end he wrote it. In turn this allowed me to examine the relationship between this often overlooked pamphlet and the more extensively studied Commentaire Philosophique, in which Bayle argued in favour of religious toleration. Ultimately, understanding the relationship between these two texts proves essential in order to characterise his response to the Revocation of the Edict of Nantes and to understand the place of the pamphlet within his oeuvre. Furthermore, an analysis of the pamphlet and the Commentaire Philosophique provide a lens through which to elucidate both Bayle's intellectual development at this early stage in his career, and also the wider context of the rise of toleration theory and the evolution of modes of civility within the Republic of Letters on the eve of the Enlightenment.