indirect proxy

نویسندگان
چکیده

if the agent, who has the right to appoint a proxy, exercises his right and appoints another person for pursuing the subject of agency, the appointed person is not the agent of the appointer; rather, he is regarded as the indirect agent of the client. therefore, if the object of agency is conclusion of a transaction contract and the indirect proxy concludes it, that [contract] belongs to the client, who should fulfill the commitments undertaken thereby, provided that the proxy has not overstepped the limits of his authority. in case the proxy oversteps the limits of his authority, if the object of transaction or its substitute belongs to the client, the contract is not valid, unless the client confirms it explicitly or implicitly. but if the subject of transaction or its substitute is general, the agent or the indirect agent has to fulfill the commitments undertaken in the contract and the client is not committed to fulfill it.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks

The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly changing topologies such as those in mobile ad hoc networks, the shortest single path is quite unstable for reachability and also for traffic load equilibrium. In this paper, we propose a novel scheme, called Applicative...

متن کامل

Proxy Signatures Secure Against Proxy Key Exposure

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...

متن کامل

Proxy PNNI Augmented Routing (Proxy PAR)

ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...

متن کامل

Proxy 'actualism'

Proxy ‘Actualism’ Karen Bennett Forthcoming in Philosophical Studies

متن کامل

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

متن کامل

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
فقه و اصول

جلد ۲۰۱۲، شماره ۲، صفحات ۰-۰

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023