• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • Tagged with
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Sicherheitsleistung für die Prozesskosten : eine rechtsvergleichende und rechtspolitische Betrachtung /

Danelzik, Wilhelm. January 1900 (has links)
Thesis (doctoral)--Friedrich-Wilhelm-Universität Bonn.
2

Jistota na náklady řízení v mezinárodní arbitráži / Security for Costs in International Arbitration

Trchalíková, Pavlína January 2018 (has links)
This diploma thesis is about the instrument of security for costs in international arbitration and the purpose it serves, for which it aims at answering two essential questions. The first issue the thesis focuses on is determination of circumstances that may lead arbitrators to the conclusion that they have power to order a claimant to post security for costs. The second task of this thesis is to analyse under what conditions it is justified for the arbitrators to use the power and issue such an order. The thesis compares and construes arbitration laws and rules of procedure which are significant for the scrutinized issues or diversifies possible conclusions. The thesis also relies on interpretation embraced by various arbitral bodies and tribunals and is inspired by approaches adopted by the international community. Eventually, the research shows that there is an overwhelming consensus in both international arbitration practice and doctrine with regard to the powers of arbitrators to issue an order for security for costs. Generally, arbitrators are entrusted with such powers and where doubted, they may draw the powers from the applicable laws or the status of the arbitral body itself by means of interpretation. On the other hand, the analysis indicates that there is no unanimity regarding...
3

Problematika vymáhání pohledávek podle právního řádu České republiky / Recovery of Debts according to the Legal Order of the Czech Republic

Zítková, Jindra January 2009 (has links)
The thesis is focused on questions of natural persons' recovery of debts according to the legal order of the Czech Republic. The purpose of the thesis was to provide creditors with comprehensive information and insight into the questions of recovery of natural persons' debts according to the legal order of the Czech Republic and to draw creditor's attention to legal possibilities when recovering debts. The outcome of the thesis is creation of diagram that can help creditors to better orientation. Diagram shows separate steps creditors can undergo when recovering debts. Particular possibilities when recovering debts are outlined, practical instruction and remarks are added, economic contexts are analysed, available statistics and development trends are analysed and proposals de lege ferenda are presented.
4

SELinux policy management framework for HIS

Marin, Luis Franco January 2008 (has links)
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
5

Zabezpečení žen v těhotenství a mateřství a ochrana jejich práv v ČR a EU / Social security for women in pregnancy and maternity and the protection of their rights in the Czech Republic and the EU

Pérezová, Dana January 2014 (has links)
Social security for women in pregnancy and maternity and the protection of their rights in the Czech Republic and the EU The objective of this diploma thesis is to describe and analyse the topic of protection and social security of pregnant women and mothers in the Czech Republic and the EU. The reason of such protection lies in the fact that during pregnancy and early maternity women and their families are significantly limited in their possibilities of working, which is connected with a decrease in the family income and a certain difficulty in the social life. The main part of the thesis consists of five chapters. The first chapter concerns the family policy, which is a state policy branch that focuses on the support of a family, family life and other related institutes and activities, e. g. marriage, motivation of employers to employ pregnant women and mothers or parents, support of institutions that provide care and education to small children etc. The section dedicated to the social security funding explains possible resources and methods of financing the social protection used within contemporary developed political and economic systems. The second chapter highlights the principal documents of the European Union and international organizations (United Nations, International Labour...

Page generated in 0.0392 seconds