user property
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 2)

H-INDEX

0
(FIVE YEARS 0)

Author(s):  
Paulina Y Amtiran ◽  
Aldarine Molidya

According to Law Number 17 of 2003 concerning State Finance, the President as the Head of Government holds the power to manage state finances as part of government power and power over the management of state finances is used to achieve state goals. However, to assist the Head of Government's duties, this power is delegated to the Minister of Finance, the Minister / head of the institution as the Budget User / Property User of the state ministries / institutions he leads and to the governor / regent / mayor as the head of the regional government.Financial management stages consist of planning, implementation, administration, reporting, accountability and supervision. Everything has been regulated in Law No.17 of 2003 on State Finance. In Law Number 17 of 2003 concerning State Finance, particularly articles 1 and 2, it is explained that what is meant by State Finance is all the rights and obligations of the state that can be valued in money, as well as everything in the form of money or in the form of goods that can be made state property related to the implementation of these rights and obligations. Keywords: Management Of State Finances, Rights And Obligations


Wireless networks are been used now-a-days. The most important fact about wireless network is it is mobile. It is thus used in many fields. One of the most important applications of wireless networks is Mobile Ad hoc NETwork (MANET) in which all the nodes work as both transmitter and receiver. MANETs are used in various fields like military, industry and emergency recovery. In order to provide adequate security against multiple attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques. Intrusion Detection and Prevention System (IDPS) is an effective defense mechanism that detects and prevents the security attacks at various levels. In recent work a polynomial key is employed for achieving useful key generation process and a polynomial is generated to compute the pair-wise key but it can be easily detected by the attacker so to improve the security in IDPS system, this work proposes the secure routing using Novel SEcured Keys Generation (NSEKG) against IDPS system. This proposal implements with two major keys: Secure Key (SeK) and Sharing key (ShK) creation is performed via the use of the User Property based Artificial Bee Colony (UPABC) algorithm and the frequency based behavior with certainty measurement on routing paths. These SeK and ShK keys creation with UPABC scheme exploits the encrypted value of the packets and the decryption determine whether the route reply is the result of a malicious node or not. The proposed NSEKG -IDPS system is very effective for communication attacks and needs to be gradually improved in order to detect multiple attacks. The performance is evaluated primarily in accordance with the subsequent metrics like Packet delivery ratio (PDR), Routing Overhead (RO), End-End-Delay (E2E), and Throughput


Author(s):  
Pascale Chapdelaine

This chapter proposes two principles that should inform the development of copyright law and policy and of user rights. The first calls for more cohesion between copyright law, private law, and public law, and for less exceptionalism in copyright law. The second requires that the balance in copyright law be adjusted for its future application as a mediation tool between the competing interests of copyright holders, users, intermediaries, and the public. Instituting positive obligations for copyright holders in relation to users and steering freedom of contract toward the objectives of copyright law are necessary regulatory changes to rectify ongoing imbalances. The principle of technological neutrality should guide the judiciary in its application of copyright’s objective of promoting a balance in copyright law. The proposed guiding principles lead to the creation of a taxonomy and hierarchy of copyright user rights that take into account the myriad ways users experience copyright works.


2016 ◽  
Vol 21 (4) ◽  
pp. 69-80
Author(s):  
Kyuhyup Oh ◽  
Kwang Il Park ◽  
Hee-Chan Kim ◽  
Woo Ju Kim ◽  
Soo-Hong Lee ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document