Search results for "third party"
showing 8 items of 18 documents
Visualization of EDI messages
2003
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has become more important and their tasks more difficult. Current development activities for supporting the utilization of XML in electronic commerce focuses on message standardization and specification of common business architectures, processes, and web practices. A need to visualize EDI messages in different contexts to human readers has received insufficient attention in ongoing activities. In this paper we discuss problems and approaches related to the visualization of EDI messages in XML format. An idea of a standar…
Appunti per una ricerca sui servizi di disposizione di ordini di pagamento
2021
This essay will explore issues related to the Payment Initiation Service, which are currently subject to Directive 2015/2366/EC (Payment Services Directive II) and, in Italy, to the Law Decree n. 11, 27th January 2010. The analysis will examine its key points, through the study of the nature of relations between payment service users and payment initiation service providers; as well as those between the latter and account servicing payment service providers. Moreover, this article will explore rights and obligations of all parties in payment transaction. Lastly, it will access criteria to allocate liability when a transaction initiated through a payment initiation service provider was unaut…
Smart Auctions for Autonomic Ambient Intelligence Systems
2020
The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…
A TRNG Exploiting Multi-Source Physical Data
2010
In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…
The Public-Key-Infrastructure of the Radiological Society of Germany.
2005
Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…
Vecchi e nuovi problemi in tema di intervento dei creditori nell’esecuzione (note a margine di Cass. S.U. n. 61 del 7 gennaio 2014)
2015
Nel contributo in oggetto l'autore, muovendo dalla decisione delle Sezioni Unite della Cassazione n. 61 del 7 gennaio 2014, coglie l'occasione per riesaminare le vecchie e nuove problematiche sottese all’intervento dei creditori nel processo esecutivo. Il primo tema affrontato è quello della par condicio creditorum, che viene esaminata nella sua storia evolutiva dal Code Napoleon, al suo periodo di massima estensione, dato dal codice del 1940, fino al suo ridimensionamento a seguito delle riforme del 2005. Esamina quindi la possibilità del possibile superamento quoad effectum della distinzione tra intervento di creditori con titolo e senza titolo, alla luce delle evoluzioni della giurisprud…
Who Punishes? The Status of the Punishers Affects the Perceived Success of, and Indirect Benefits From, “Moralistic” Punishment
2016
“Moralistic” punishment of free riders can provide a beneficial reputation, but the immediate behavior is costly to the punisher. In Study 1, we investigated whether variation in status would be perceived to offset or mitigate the costs of punishment. One hundred and nineteen participants were presented with a vignette describing a punishment scenario. Participants predicted whether punishment would occur, how successful it would be, and indicated their attitude to the punisher. Participants believed only intervention by a high-status (HS) individual would be successful and that low-status (LS) individuals would not intervene at all. HS individuals predicted to punish successfully were seen…