Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
28,342
result(s) for
"Security deposits"
Sort by:
Blockchain Infrastructure with Fragments Dependent Security Deposit Solution
2021
Blockchain is considered a shared ledger technology to be a viable alternative for heavily focused control process applications. However, most of the current blockchain networks are used for the proof of work called the Hash-Puzzle-Solving Consensus Protocol. The competition to solve the puzzle leads to high latency, leading directly to a lengthy cycle of transaction processing. One solution to this problem is the establishment of a shards blockchain network. In this article, we concentrate on the blockchain network and follow a consensus protocol on security deposits to explore the issue of how to reconcile the economic reward and incentive. The knowledge asymmetric dilemma between beacon and users is also posed by the intrinsic features of the blockchain, i.e. transparency and decentralization. The philosophy of the contract is used to describe the dilemma. The optimum incentives for the various types of validators as well as the required deposits will also be obtained. The flexible deposits may provide ample economic stimulus for participants relative to fixed deposits without sacrificing the safety incentives. Moreover, the results of simulation suggest that the contract theory strategy will optimize the effectiveness of the beacon chain and fulfil the participants’ reward compatibility and individual rationality.
Journal Article
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
2017
Today’s security is becoming a brainstorming issue due to inventive attacks. To elicit effective security requirement to the system, software developers need to think like an attacker. This paper considers three effective security requirement elicitation techniques, Threat modelling, Misuse case and Attack pattern. Threat Modeling is a technique to prevent the system from any undesired event by modeling all the information which has the potential to harm the system. It is a process for eliciting security requirement by identifying harmful threats to the system. Misuse case represents negative use cases to model threats and mis-actors to represent attackers. Misuse cases are capable of modeling threat and risk analysis process. Attack Pattern works as a method to identify the attacker’s perspective. Specifically, Threat modelling, Attack pattern and Misuse case are compared on the basis of some parameters. The comparative analysis provides some merits and demerits of these techniques. This paper investigates how misuse cases enhance the performance of threat modeling. This paper also describes an effective way for security requirement elicitation by integrating threat modeling with attack pattern and misuse cases.
Journal Article
Sicherheitsleistung bei AdV bei Verletzung der erhöhten Mitwirkungspflicht nach § 90 Abs. 2 AO
2023
EStG § 50d Abs. 9; FGO § 69; DBA Jugoslawien Art. 7, Art. 14, Art. 15; AO § 901) Die Anordnung einer Sicherheitsleistung zwecks Vermeidung von Steuerausfällen in Fällen der AdV kommt u.a. dann in Betracht, wenn der Steuerpflichtige seinen Wohnsitz im Ausland hat oder der Steuerbescheid aus anderen Gründen im Ausland vollstreckt werden müsste, ohne dass völkervertraglich gewährleistet ist, in dem betreffenden Land wie im Inland vollstrecken zu können.2) Allerdings tritt das öffentliche Interesse an der Vermeidung von Steuerausfällen gegenüber dem Rechtsschutzinteresse des Steuerpflichtigen zurück, wenn mit Gewissheit oder großer Wahrscheinlichkeit ein für ihn günstiger Prozessausgang zu erwarten ist.3) Dies ist der Fall, wenn sich der Steuerpflichtige hinsichtlich der streitigen rechtlichen Erwägungen auf eine gefestigte höchstrichterliche Rechtsprechung berufen kann oder wenn sich in einem rechtlich schwierigen Fall der Sachverhalt in den Akten des Finanzamts so ungeordnet, verworren oder widersprüchlich darstellt, dass die rechtliche Subsumtion Schwierigkeiten bereitet.4) Die Nichtvorlage serbischer Steuererklärungen und -bescheide rechtfertigt allein keine Besteuerung gem. § 50d Abs. 9 EStG. Ohne zusätzliche Anhaltspunkte, die das FA vorzutragen hat, fehlt eine ausreichende Wahrscheinlichkeit für dessen Anwendbarkeit. (alle amtl.)BFH, Beschl. v. 27.2.2019 – I B 58/18(FG Berlin-Brandenburg v. 26.7.2018 – 3 V 3099/18)
Trade Publication Article
Ijārah Financing in Pakistan Islamic Banks
by
Hammad Khursheed
,
Zeeshan Ali Khan
,
Syed Ehsanullah Agha
in
ECONOMIC ASPECTS
,
FINANCING
,
ISLAMIC BANKING
2017
Journal Article
Mother out of work struggling to help adopted son
2016
Tony loved watching cartoons but Terri had to make the hard decision to sell her only remaining television to put a security deposit down on the apartment where they just moved into.
Newsletter
Young Mining licence suspended over unpaid environmental security deposits
2016
Young Mining, based in the New South Wales Riverina, has been warned about the unpaid environmental rehabilitation security deposits since 2013, the NSW Government says.
Newsletter