Search results for "trust"
showing 10 items of 446 documents
Contratto di rete e diritto antitrust
2017
La disciplina del contratto di rete (“c.d.r.”) – introdotta nel nostro ordinamento giuridico dalla l. 9 aprile 2009, n. 33 (di conversione del d.l. 10 febbraio 2009, n. 5, c.d. Decreto incentivi), e poi a più riprese modificata in modo sostanziale – ha sin dalla sua emanazione suscitato molteplici dubbi interpretativi ed incisive critiche, per lo più determinati da problemi d’inquadramento sistematico e dalla lacunosità del dettato normativo. La dottrina più incline a manifestare il proprio favore verso il nuovo istituto contrattuale, comunque, ne ha sovente evidenziato l’unicità nel panorama europeo, tale da conferire al legislatore italiano (una volta tanto) il ruolo di precursore nell’el…
Disposición testamentaria para realizar la afección de bienes en derecho italiano. Una hipótesis más allá del patrimonio protegido y del trust
2019
This article intends to illustrate the very recent Italian experience on the fiduciary contract, as a tool capable of realizing a patrimonial segregation, different from trust. The contract of fiduciary, which in 2010 was expressly regulated by a law of San Marino, is not yet regulated by any Italian law, even if the project of reform of the civil code provides that the legislator should dictate its own discipline. The fact that it is not expressly regulated does not exclude that the instrument has already been successful. In this article, after describing the features of the fiduciary contract and proposing a new reconstruction, attention is paid to its interference with inheritance law. I…
Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives
2015
A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security prob…
tutela della concorrenza e professione forense
2015
lo studio approfondisce le problematiche sollevate dall'esercizio del professione forense nel mercato della concorrenza.
Independent regulation in the contemporary Italian legal system
2018
According to some comparative studies, contemporary nation states exhibit an apparently impetuous worldwide general convergence toward the establishment of independent regulatory authorities (IRAs) with regard to a wide range of policy sectors (§ 2). In the Italian political system of the so-called First Republic (1948-93), the widespread attitude towards independent regulation used to be unfavourable. IRAs were affected by several obstructing factors which postponed or hindered their creation and undermined the institutionalization and the performance of the few existing ones (§ 3). In recent years some new IRAs were introduced, and some of the existing ones (which in the past had undergon…
Ethical Versus Conventional Banking: A Case Study
2018
The 2008 financial crisis has changed the structure of banking, generating public distrust in the conventional financial system. An alternative has emerged as a result of this lack of confidence. This alternative is known as ethical banking. A growing number of investors, asset managers, and financial intermediaries have incorporated sustainability considerations into their business practices. This paper discusses the origins of ethical banking and describes its primary characteristics. The goal is to determine whether ethical banking can be as profitable as conventional banking despite only investing in projects based on social values. A comparative analysis is performed to identify differ…
Zaangażowanie muzeum w proces komunikowania o zmianie klimatu
2019
In this paper I addressed the issue of the engagement of museums in climate change. The problem of climate change is so important in the current social context that, despite its difficult political connotations, it cannot be ignored by museums, especially if we consider a museum as an element of a public sphere. Climate change is a challenge in 21st century. Climate change will present challenges that are of long-term nature, multidimensional and global phenomenon. It could impact directly on museums. I assume museums can provide a safe place for dialogue around climate change. Museums can also inform publics about the science of climate change and help to equip people with knowledge, shape…
Muzeum jako instytucja odpowiedzialna społecznie. Rola muzeum w debacie na temat zmian klimatycznych
2019
W artykule analizuję możliwości zaangażowania muzeum w problem zmian klimatycznych. Zagadnienie to jest na tyle istotną kwestią w dzisiejszym dyskursie społecznym, że pomimo jego trudnych konotacji politycznych nie może być pomijane przez muzea, szczególnie jeśli rozpatrujemy je jako instytucje sfery publicznej. Zmiana klimatu to jedno z największych wyzwań, z jakim musimy się zmierzyć w XXI w. Następstwa zmian klimatycznych są długotrwałe, wielowymiarowe i mają charakter globalny – będą miały również bezpośredni wpływ na przyszłą działalność muzeum. Muzeum – jako instytucja publiczna – nieustannie dostosowuje swoją ofertę do zmieniających się okoliczności społecznych. Zaangażowanie muzeum …
System for Executing Encrypted Native Programs
2017
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …
Preventing Execution of Unauthorized Native-Code Software
2017
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…