Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
28,342 result(s) for "Security deposits"
Sort by:
Blockchain Infrastructure with Fragments Dependent Security Deposit Solution
Blockchain is considered a shared ledger technology to be a viable alternative for heavily focused control process applications. However, most of the current blockchain networks are used for the proof of work called the Hash-Puzzle-Solving Consensus Protocol. The competition to solve the puzzle leads to high latency, leading directly to a lengthy cycle of transaction processing. One solution to this problem is the establishment of a shards blockchain network. In this article, we concentrate on the blockchain network and follow a consensus protocol on security deposits to explore the issue of how to reconcile the economic reward and incentive. The knowledge asymmetric dilemma between beacon and users is also posed by the intrinsic features of the blockchain, i.e. transparency and decentralization. The philosophy of the contract is used to describe the dilemma. The optimum incentives for the various types of validators as well as the required deposits will also be obtained. The flexible deposits may provide ample economic stimulus for participants relative to fixed deposits without sacrificing the safety incentives. Moreover, the results of simulation suggest that the contract theory strategy will optimize the effectiveness of the beacon chain and fulfil the participants’ reward compatibility and individual rationality.
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
Today’s security is becoming a brainstorming issue due to inventive attacks. To elicit effective security requirement to the system, software developers need to think like an attacker. This paper considers three effective security requirement elicitation techniques, Threat modelling, Misuse case and Attack pattern. Threat Modeling is a technique to prevent the system from any undesired event by modeling all the information which has the potential to harm the system. It is a process for eliciting security requirement by identifying harmful threats to the system. Misuse case represents negative use cases to model threats and mis-actors to represent attackers. Misuse cases are capable of modeling threat and risk analysis process. Attack Pattern works as a method to identify the attacker’s perspective. Specifically, Threat modelling, Attack pattern and Misuse case are compared on the basis of some parameters. The comparative analysis provides some merits and demerits of these techniques. This paper investigates how misuse cases enhance the performance of threat modeling. This paper also describes an effective way for security requirement elicitation by integrating threat modeling with attack pattern and misuse cases.
Sicherheitsleistung bei AdV bei Verletzung der erhöhten Mitwirkungspflicht nach § 90 Abs. 2 AO
EStG § 50d Abs. 9; FGO § 69; DBA Jugoslawien Art. 7, Art. 14, Art. 15; AO § 901) Die Anordnung einer Sicherheitsleistung zwecks Vermeidung von Steuerausfällen in Fällen der AdV kommt u.a. dann in Betracht, wenn der Steuerpflichtige seinen Wohnsitz im Ausland hat oder der Steuerbescheid aus anderen Gründen im Ausland vollstreckt werden müsste, ohne dass völkervertraglich gewährleistet ist, in dem betreffenden Land wie im Inland vollstrecken zu können.2) Allerdings tritt das öffentliche Interesse an der Vermeidung von Steuerausfällen gegenüber dem Rechtsschutzinteresse des Steuerpflichtigen zurück, wenn mit Gewissheit oder großer Wahrscheinlichkeit ein für ihn günstiger Prozessausgang zu erwarten ist.3) Dies ist der Fall, wenn sich der Steuerpflichtige hinsichtlich der streitigen rechtlichen Erwägungen auf eine gefestigte höchstrichterliche Rechtsprechung berufen kann oder wenn sich in einem rechtlich schwierigen Fall der Sachverhalt in den Akten des Finanzamts so ungeordnet, verworren oder widersprüchlich darstellt, dass die rechtliche Subsumtion Schwierigkeiten bereitet.4) Die Nichtvorlage serbischer Steuererklärungen und -bescheide rechtfertigt allein keine Besteuerung gem. § 50d Abs. 9 EStG. Ohne zusätzliche Anhaltspunkte, die das FA vorzutragen hat, fehlt eine ausreichende Wahrscheinlichkeit für dessen Anwendbarkeit. (alle amtl.)BFH, Beschl. v. 27.2.2019 – I B 58/18(FG Berlin-Brandenburg v. 26.7.2018 – 3 V 3099/18)
Trade Publication Article
Mother out of work struggling to help adopted son
Tony loved watching cartoons but Terri had to make the hard decision to sell her only remaining television to put a security deposit down on the apartment where they just moved into.
Young Mining licence suspended over unpaid environmental security deposits
Young Mining, based in the New South Wales Riverina, has been warned about the unpaid environmental rehabilitation security deposits since 2013, the NSW Government says.