39,506 research outputs found
Recommended from our members
BEPS Policy Failure—The Case of EU Country-By-Country Reporting1
The tax gap between taxes that are “actually” paid and taxes that “ought” to have been paid by multinational corporate entities has become an area of huge public policy concern in the recent decades. This study reviews the impact of new legislation to reveal the tax gap created by the EU banks and financial institutions passed in 2013 and in particular of the quality of the resulting country-by-country reporting (CBCR) requirement for banks. Although resulting tax gap estimates are noted, they suffer due to significant problems in the published data; much of it is due to the quality of the regulation requiring its publication and implementation. The findings reveal a lack of understanding of the technical and structural weaknesses of accounting in a transnational context in the design of this regulation. CBCR is destined to fail in achieving its regulatory objectives in this context unless necessary reform of the regulation is undertaken
Plane-stress, elastic-plastic states in the vicinity of crack tips
Plane stress analysis of elastic-plastic states in vicinity of straight crack tip in thin plat
Covert Ephemeral Communication in Named Data Networking
In the last decade, there has been a growing realization that the current
Internet Protocol is reaching the limits of its senescence. This has prompted
several research efforts that aim to design potential next-generation Internet
architectures. Named Data Networking (NDN), an instantiation of the
content-centric approach to networking, is one such effort. In contrast with
IP, NDN routers maintain a significant amount of user-driven state. In this
paper we investigate how to use this state for covert ephemeral communication
(CEC). CEC allows two or more parties to covertly exchange ephemeral messages,
i.e., messages that become unavailable after a certain amount of time. Our
techniques rely only on network-layer, rather than application-layer, services.
This makes our protocols robust, and communication difficult to uncover. We
show that users can build high-bandwidth CECs exploiting features unique to
NDN: in-network caches, routers' forwarding state and name matching rules. We
assess feasibility and performance of proposed cover channels using a local
setup and the official NDN testbed
- …