971 resultados para Secured Transactions
Resumo:
Includes supplement published in 1963.
Resumo:
La réforme et l’harmonisation du droit des sûretés mobilières sont à l’ordre du jour de plusieurs organisations internationales, car il est admis qu’un régime de sûretés efficient favorise l’accès au crédit à de faibles coûts. L’harmonisation de ce droit comporte deux volets. D’une part, dans l’Occident industrialisé, les efforts d’harmonisation vont de la réforme des droits internes à l’établissement de régimes spéciaux relativement à des biens spécifiques (principalement les biens mobiles de grande valeur, tels les aéronefs, le matériel ferroviaire roulant et les satellites, et les biens incorporels, comprenant les créances, valeurs mobilières, actifs financiers et titres intermédiés). Ces efforts d’harmonisation démontrent que d’un point de vue systémique, malgré quelques différences notables, les régimes nord-américains et européens sont fondés sur des principes similaires et atteignent des résultats comparables. En résulte l’émergence d’un ordre juridique transnational en droit des sûretés mobilières, fondé sur les principes de la primauté de l’individu et la reconnaissance du droit de propriété de l’individu dans ses biens, mis en œuvre grâce à l’État de droit. D’autre part, les institutions financières internationales encouragent l’établissement de régimes de sûretés dans les pays en voie de développement qui obéissent aux mêmes critères que ceux de l’Occident, en insistant sur les réformes institutionnelles et juridiques visant l’établissement d’une bonne gouvernance et l’État de droit. Cependant, une transposition des régimes occidentaux ne peut se faire sans heurts dans les pays en voie de développement, notamment pour des raisons socio-culturelles et politiques. Lorsque les principes de la primauté de l’individu, de la propriété individuelle et de l’État de droit ne sont pas reconnus dans un pays donné, la réforme et l’harmonisation du droit des sûretés s’en trouvent compromis. La démonstration de l’état d’avancement de la réforme et de l’harmonisation du droit des sûretés dans les pays occidentaux industrialisés est faite grâce à une comparaison du Uniform Commercial Code, du Code civil du Québec, des Personal Property Security Acts des provinces canadiennes de common law, des principes des droits français et anglais, de l’influence du droit communautaire sur les pays membres de l’Union Européenne. Sont analysés, aussi, dans cette optique, les principaux instruments de l’harmonisation du droit émanant des organisations internationales. Par ailleurs, deux études de cas relatifs à la réforme du crédit foncier en Égypte et à la réforme de l’urbanisme et de l’habitat en République démocratique du Congo, viennent étayer les difficultés que rencontrent les institutions internationales, telles la Banque mondiale et l’ACDI, dans le cadre de projets de réformes visant la bonne gouvernance et l’instauration d’un véritable État de droit, en partie à cause d’un pluralisme des ordres juridiques de ces pays.
Resumo:
Cotutelle entre l’Université de Montréal et l’Université de Paris I Panthéon-Sorbonne
Resumo:
Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain – a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users' to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.
Resumo:
"This copy is one of an edition of three hundred copies printed from type by the De Vinne press."--T.p. verso.
Resumo:
Broadcast networks that are characterised by having different physical layers (PhL) demand some kind of traffic adaptation between segments, in order to avoid traffic congestion in linking devices. In many LANs, this problem is solved by the actual linking devices, which use some kind of flow control mechanism that either tell transmitting stations to pause (the transmission) or just discard frames. In this paper, we address the case of token-passing fieldbus networks operating in a broadcast fashion and involving message transactions over heterogeneous (wired or wireless) physical layers. For the addressed case, real-time and reliability requirements demand a different solution to the traffic adaptation problem. Our approach relies on the insertion of an appropriate idle time before a station issuing a request frame. In this way, we guarantee that the linking devices’ queues do not increase in a way that the timeliness properties of the overall system turn out to be unsuitable for the targeted applications.
Resumo:
The marriage of emerging information technologies with control technologies is a major driving force that, in the context of the factory-floor, is creating an enormous eagerness for extending the capabilities of currently available fieldbus networks to cover functionalities not considered up to a recent past. Providing wireless capabilities to such type of communication networks is a big share of that effort. The RFieldbus European project is just one example, where PROFIBUS was provided with suitable extensions for implementing hybrid wired/wireless communication systems. In RFieldbus, interoperability between wired and wireless components is achieved by the use specific intermediate networking systems operating as repeaters, thus creating a single logical ring (SLR) network. The main advantage of the SLR approach is that the effort for protocol extensions is not significant. However, a multiple logical ring (MLR) approach provides traffic and error isolation between different network segments. This concept was introduced in, where an approach for a bridge-based architecture was briefly outlined. This paper will focus on the details of the inter-Domain Protocol (IDP), which is responsible for handling transactions between different network domains (wired or wireless) running the PROFIBUS protocol.
Resumo:
Determining the response time of message transactions is one of the major concerns in the design of any distributed computer-controlled system. Such response time is mainly dependent on the medium access delay, the message length and the transmission delay. While the medium access delay in fieldbus networks has been thoroughly studied in the last few years, the transmission delay has been almost ignored as it is considered that it can be neglected when compared to the length of the message itself. Nevertheless, this assumption is no longer valid when considering the case of hybrid wired/wireless fieldbus networks, where the transmission delay through a series of different mediums can be several orders of magnitude longer than the length of the message itself. In this paper, we show how to compute the duration of message transactions in hybrid wired/wireless fieldbus networks. This duration is mainly dependent on the duration of the request and response frames and on the number and type of physical mediums that the frames must cross between initiator and responder. A case study of a hybrid wired/wireless fieldbus network is also presented, where it becomes clear the interest of the proposed approach
Resumo:
Classical lock-based concurrency control does not scale with current and foreseen multi-core architectures, opening space for alternative concurrency control mechanisms. The concept of transactions executing concurrently in isolation with an underlying mechanism maintaining a consistent system state was already explored in fault-tolerant and distributed systems, and is currently being explored by transactional memory, this time being used to manage concurrent memory access. In this paper we discuss the use of Software Transactional Memory (STM), and how Ada can provide support for it. Furthermore, we draft a general programming interface to transactional memory, supporting future implementations of STM oriented to real-time systems.
Resumo:
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para a obtenção do Grau de Mestre em Engenharia Informática
Resumo:
Even though Software Transactional Memory (STM) is one of the most promising approaches to simplify concurrent programming, current STM implementations incur significant overheads that render them impractical for many real-sized programs. The key insight of this work is that we do not need to use the same costly barriers for all the memory managed by a real-sized application, if only a small fraction of the memory is under contention lightweight barriers may be used in this case. In this work, we propose a new solution based on an approach of adaptive object metadata (AOM) to promote the use of a fast path to access objects that are not under contention. We show that this approach is able to make the performance of an STM competitive with the best fine-grained lock-based approaches in some of the more challenging benchmarks. (C) 2015 Elsevier Inc. All rights reserved.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics