期刊文献+
共找到10,468篇文章
< 1 2 250 >
每页显示 20 50 100
天然气管网冬季保障供应措施探讨 被引量:3
1
作者 李圣彦 李博 +1 位作者 张立恒 刘钊 《天然气技术与经济》 2016年第2期67-69,84,共3页
我国已初步建成天然气管网,但天然气冬季供需矛盾突出。为满足用气需求,以北京、新疆、湖南、湖北地区为例,分析了天然气管网冬季运行特点,从集中调控角度提出了储气库和LNG合理搭配、发挥管网运行优势、合理安排新管道机组投运、管存... 我国已初步建成天然气管网,但天然气冬季供需矛盾突出。为满足用气需求,以北京、新疆、湖南、湖北地区为例,分析了天然气管网冬季运行特点,从集中调控角度提出了储气库和LNG合理搭配、发挥管网运行优势、合理安排新管道机组投运、管存控制和远控分输以及资源串换等保障供应措施,同时重点关注应急管理工作。建议利用天然气行业改革契机,科学制定地下储气库价格机制,推进储气库建设的规模和进度;在LNG价格低位时,增加LNG现货采购数量,从多方面减轻天然气管网保供压力。 展开更多
关键词 天然气管网 调控运行 冬季供应 保障 应急管理
下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
2
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 ENCRYPTION DECRYPTION Non-Square Matrices Low Energy High secured Data Transmission
下载PDF
Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients
3
作者 Sultan Mesfer Aldossary 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3387-3404,共18页
With the emergence of cloud technologies,the services of healthcare systems have grown.Simultaneously,machine learning systems have become important tools for developing matured and decision-making computer applicatio... With the emergence of cloud technologies,the services of healthcare systems have grown.Simultaneously,machine learning systems have become important tools for developing matured and decision-making computer applications.Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services.However,in some areas,these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease(DKD)while ensuring privacy preservation of the medical data.To address the cloud data privacy problem,we proposed a DKD prediction module in a framework using cloud computing services and a data control scheme.This framework can provide improved and early treatment before end-stage renal failure.For prediction purposes,we implemented the following machine learning algorithms:support vector machine(SVM),random forest(RF),decision tree(DT),naïve Bayes(NB),deep learning(DL),and k nearest neighbor(KNN).These classification techniques combined with the cloud computing services significantly improved the decision making in the progress of DKD patients.We applied these classifiers to the UCI Machine Learning Repository for chronic kidney disease using various clinical features,which are categorized as single,combination of selected features,and all features.During single clinical feature experiments,machine learning classifiers SVM,RF,and KNN outperformed the remaining classification techniques,whereas in combined clinical feature experiments,the maximum accuracy was achieved for the combination of DL and RF.All the feature experiments presented increased accuracy and increased F-measure metrics from SVM,DL,and RF. 展开更多
关键词 Cloud computing diabetic kidney disease machine learning prediction system privacy preservation integrity of data secured data transmission homomorphic authentication
下载PDF
Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System 被引量:1
4
作者 Shraddha R.Khonde Venugopal Ulagamuthalvi 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期37-51,共15页
Exchange of data in networks necessitates provision of security and confidentiality.Most networks compromised by intruders are those where the exchange of data is at high risk.The main objective of this paper is to pr... Exchange of data in networks necessitates provision of security and confidentiality.Most networks compromised by intruders are those where the exchange of data is at high risk.The main objective of this paper is to present a solution for secure exchange of attack signatures between the nodes of a distributed network.Malicious activities are monitored and detected by the Intrusion Detection System(IDS)that operates with nodes connected to a distributed network.The IDS operates in two phases,where the first phase consists of detection of anomaly attacks using an ensemble of classifiers such as Random forest,Convolutional neural network,and XGBoost along with genetic algorithm to improve the performance of IDS.The novel attacks detected in this phase are converted into signatures and exchanged further through the network using the blockchain framework in the second phase.This phase uses the cryptosystem as part of the blockchain to store data and secure it at a higher level.The blockchain is implemented using the Hyperledger Fabric v1.0 and v2.0,to create a prototype for secure signature transfer.It exchanges signatures in a much more secured manner using the blockchain architecture when implemented with version 2.0 of Hyperl-edger Fabric.The performance of the proposed blockchain system is evaluated on UNSW NB15 dataset.Blockchain performance has been evaluated in terms of execution time,average latency,throughput and transaction processing time.Experimental evidence of the proposed IDS system demonstrates improved performance with accuracy,detection rate and false alarm rate(FAR)as key parameters used.Accuracy and detection rate increase by 2%and 3%respectively whereas FAR reduces by 1.7%. 展开更多
关键词 Blockchain intrusion detection system machine learning algorithms secured communication ensemble approach
下载PDF
A Collaborative Medical Diagnosis System Without Sharing Patient Data 被引量:1
5
作者 NAN Yucen FANG Minghao +2 位作者 ZOU Xiaojing DOU Yutao Albert Y.ZOMAYA 《ZTE Communications》 2022年第3期3-16,共14页
As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploi... As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploiting its potential because the data usually sits in data silos,and privacy and security regulations restrict their access and use.To address these issues,we built a secured and explainable machine learning framework,called explainable federated XGBoost(EXPERTS),which can share valuable information among different medical institutions to improve the learning results without sharing the patients’ data.It also reveals how the machine makes a decision through eigenvalues to offer a more insightful answer to medical professionals.To study the performance,we evaluate our approach by real-world datasets,and our approach outperforms the benchmark algorithms under both federated learning and non-federated learning frameworks. 展开更多
关键词 explainable machine learning federated learning secured data analysis medical applications
下载PDF
妇女小额担保贴息贷款实施效果研究——以江西永修县和甘肃成县为例 被引量:1
6
作者 李树杰 《中华女子学院学报》 2015年第1期50-58,共9页
迄今已经实施了五年的妇女小额担保贴息贷款政策的实施效果如何,是政府和业界关注的重点。本研究采用实地抽样问卷调查、数理定量统计的方法,对该公益性普惠财金政策的实施效果进行了进村入户问卷调查,然后借助SPSS统计软件对数据进行... 迄今已经实施了五年的妇女小额担保贴息贷款政策的实施效果如何,是政府和业界关注的重点。本研究采用实地抽样问卷调查、数理定量统计的方法,对该公益性普惠财金政策的实施效果进行了进村入户问卷调查,然后借助SPSS统计软件对数据进行整理和详细的统计分析,再采用多层线性回归的方法构建了"贴息贷款偿还率模型"和"借款妇女对贴息贷款政策满意度模型"。依据统计分析结果以及影响偿还率和满意度的相关变量及其参数,提出上调贷款额度上限、将贷款期限的决策权授予金融机构、对乡村妇女灵活采用个人信用担保放贷、简化审放贷手续、向农村妇女定期提供创业知识和技能培训等增值服务的五条政策建议。 展开更多
关键词 妇女创业 担保 小额贴息贷款
下载PDF
Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
7
作者 D.Prabakaran Shyamala Ramachandran 《Computers, Materials & Continua》 SCIE EI 2022年第1期1781-1798,共18页
The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of... The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of VPN evades the hurdles involved in physical money exchange.The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server.The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014,Capital One Data Breach in 2019,and manymore cloud server attacks over and over again.These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat.This research paper,propose a framework with a base of EllipticalCurve Cryptography(ECC)to performsecure financial transactions throughVirtual PrivateNetwork(VPN)by implementing strongMulti-Factor Authentication(MFA)using authentication credentials and biometric identity.The research results prove that the proposed model is to be an ideal scheme for real-time implementation.The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users. 展开更多
关键词 Cloud computing elliptical curve cryptography multi-factor authentication mel frequency cepstral coefficient privacy protection secured framework secure financial transactions
下载PDF
Review about Wireless Sensor Networks and the Internet of Things
8
作者 Amarjit Singh 《Journal on Internet of Things》 2022年第2期69-73,共5页
Wireless sensor networks(WSNs)are created and affect our daily lives.You can find applications in various fields such as health,accident,life,manufacturing,production management,network management and many other field... Wireless sensor networks(WSNs)are created and affect our daily lives.You can find applications in various fields such as health,accident,life,manufacturing,production management,network management and many other fields.WSN now connects to the Internet of Things,connects the sensor to the Internet,and then uses it for collaboration and collaboration.However,when WSN is part of the internet we need to be able to study and analyze related terms.In this article,we’re going to look at different ways to getWSN online and identify the challenges that address in future as well. 展开更多
关键词 Dynamic condition monitoring secured database moving vehicle position tracking auto fuel checking
下载PDF
Will Germany move into a situation with unsecured power supply?
9
作者 Harald SCHWARZ 《Frontiers in Energy》 SCIE CSCD 2019年第3期551-570,共20页
Together with a huge number of other countries, Germany signed the Paris Agreements in 2015 to prevent global temperature increase above 2℃. Within this agreement, all countries defined their own national contributio... Together with a huge number of other countries, Germany signed the Paris Agreements in 2015 to prevent global temperature increase above 2℃. Within this agreement, all countries defined their own national contributions to CO2 reduction. Since that, it was visible that CO2 emissions in Germany decreased, but not so fast than proposed in this German nationally determined contribution to the Paris Agreement. Due to increasing traffic, CO2 emissions from this mobility sector increased and CO2 emission from German power generation is nearly constant for the past 20 years, even a renewable generation capacity of 112 GW was built up in 2017, which is much higher than the peak load of 84 GW in Germany. That is why the German National Government has implemented a commission (often called "The German Coal Commission") to propose a time line: how Germany can move out of coal-fired power stations. This "Coal Commission" started its work in the late spring of 2018 and handed over its final report with 336 pages to the government on January 26th, 2019. Within this report the following proposals were made:①Until 2022: Due to a former decision of the German Government, the actual remaining nuclear power generation capacity of about 10 GW has to be switched off in 2022. Besides, the "Coal Commission" proposed to switch off additionally in total 12.5 GW of both, hard coal and lignite-fired power plants, so that Germany should reduce its conventional generation capacity by 22.5 GW in 2022.②Until 2030: Another 13 GW of German hard coal or lignite-fired power plants should be switched off.③Until 2038:The final 17 GW of German hard coal or lignitefired power plants should be switched off until 2038 latest. Unfortunately the "Coal Commission" has not investigated the relevant technical parameter to ensure a secured electric power supply, based on German's own national resources. Because German Energy Revolution mainly is based on wind energy and photovoltaic, this paper will describe the negligible contribution of these sources 展开更多
关键词 CO2 reduction mobility sector RENEWABLE GENERATION coal COMMISSION secured POWER GENERATION capacity reliable POWER supply power-to-gas power-to-heat
原文传递
论最高额抵押物被查封后担保债权范围的确定
10
作者 舒军 《法学(汉斯)》 2020年第3期459-465,共7页
我国现行有效的法律与司法解释均未就最高额抵押担保债权的范围如何确定作出明确的规定,将于2021年1月1日起施行的《中华人民共和国民法典》也未就此作出进一步的规定。在司法实践中,抵押的财产不足以清偿所有担保债权且债务人又无其他... 我国现行有效的法律与司法解释均未就最高额抵押担保债权的范围如何确定作出明确的规定,将于2021年1月1日起施行的《中华人民共和国民法典》也未就此作出进一步的规定。在司法实践中,抵押的财产不足以清偿所有担保债权且债务人又无其他财产可供清偿的情况下,如何确定最高额抵押担保的债权范围将直接关系到各抵押权人及普通债权人债权能否实现及实现多少。为明确享有优先受偿权的债权范围,避免此类纠纷的发生,最高人民法院有必要对此作出明确规定。 展开更多
关键词 最高额抵押 担保 债权 范围
下载PDF
基于Secured BOX的可信健康校园网络建设
11
作者 徐雪松 梅玖红 +1 位作者 吴志军 徐向阳 《教育信息化》 CSSCI 2005年第12X期62-63,共2页
关键词 校园网络建设 健康 安全防火墙 可信 信息过滤 垃圾邮件 黑客入侵 统一管理 管理机构 内容控制 secured BOX
下载PDF
担保物权制度的成长与蜕变 被引量:87
12
作者 谢在全 《法学家》 CSSCI 北大核心 2019年第1期36-56,191-192,共22页
担保制度既有确保债权实现的功能,也有促成资金高效率运用的功能。凡法律行为以担保债权为目的,并得直接支配担保标的之价值,无论其权利构造或名称为何,概以担保论。随着时代的发展,担保标的物由土地到建筑物、由不动产到动产、有形资... 担保制度既有确保债权实现的功能,也有促成资金高效率运用的功能。凡法律行为以担保债权为目的,并得直接支配担保标的之价值,无论其权利构造或名称为何,概以担保论。随着时代的发展,担保标的物由土地到建筑物、由不动产到动产、有形资产到无形资产、现有资产到将来取得资产、单一物到集合物、固定资产到流动资产;担保债权自特定债权转向不特定债权,担保物权从属性及担保债权特定原则发生松动;担保物权内容之契约自由性格特别凸显,契约自由原则不断突破物权法定原则;收益价值自用益价值中脱颖而出,成为独立的价值型态;声明登录制和控制公示方法崭露头角;实行程序上,私实行程序兴起,收益执行得以运用。担保物权制度的立法动向上存在以下趋势:物权标的特定性和担保物权从属性发生缓和;物权法定原则柔软化;登录内容弹性化;担保物权管理机能日益重要;担保物权实行方法多样化;动产担保权单一化及其立法的统一化。 展开更多
关键词 物权法定 担保债权特定原则 收益价值 私实行程序 声明登录制
原文传递
金融发展、产权性质与上市公司担保融资 被引量:74
13
作者 沈红波 廖冠民 曹军 《中国工业经济》 CSSCI 北大核心 2011年第6期120-129,共10页
银行贷款是我国企业最重要的融资渠道,对经济增长有重要影响。本文主要考察金融发展是否以及如何影响企业的贷款担保融资,为金融发展影响经济增长提供微观经验证据。我们以中国上市公司的贷款担保数据为样本,实证检验发现:①产权性质对... 银行贷款是我国企业最重要的融资渠道,对经济增长有重要影响。本文主要考察金融发展是否以及如何影响企业的贷款担保融资,为金融发展影响经济增长提供微观经验证据。我们以中国上市公司的贷款担保数据为样本,实证检验发现:①产权性质对贷款担保存在显著影响,由于政府对银行信贷决策的隐性担保和行政干预,国有公司能以较少的担保获得银行贷款;②金融发展可以显著缓解银企之间的信息不对称,金融发展水平越高,民营公司的担保贷款比例越低;③金融发展对政府干预的抑制作用超过了降低信息不对称的作用,导致国有公司的担保贷款比例随着金融发展水平的提高而增加;④金融发展对不同规模的企业担保贷款的影响存在差异,金融发展可以更显著地降低小规模民营公司的担保贷款比例。本文的实证结果表明,金融发展水平的提高有助于减弱银企之间的信息不对称,降低银行对小规模民营公司贷款的担保要求,以及抑制政府的信贷干预行为,对促进经济增长有积极作用。 展开更多
关键词 金融发展 产权性质 担保融资
原文传递
区块链技术在电力辅助服务领域的应用综述 被引量:74
14
作者 李彬 曹望璋 +4 位作者 祁兵 孙毅 郭乃网 苏运 崔高颖 《电网技术》 EI CSCD 北大核心 2017年第3期736-744,共9页
售电市场放开后,参与交易的主体数量、类型、业务类别逐渐增多。为应对完全竞争市场条件下多实体参与的辅助服务市场交易安全可信问题,提出了基于区块链技术的解决方案。首先阐明了区块链技术基本原理,剖析了区块链技术在辅助服务市场... 售电市场放开后,参与交易的主体数量、类型、业务类别逐渐增多。为应对完全竞争市场条件下多实体参与的辅助服务市场交易安全可信问题,提出了基于区块链技术的解决方案。首先阐明了区块链技术基本原理,剖析了区块链技术在辅助服务市场中应用的关键性技术,分别从工作量证明、共识记账、智能合约、业务交互、密钥管理等方面提出了具体实施方案。同时,还结合辅助服务中涉及资金流监管、智能合约业务的应用需求,提出了辅助服务系统从集中式管理向分布式智能管理的发展思路。最后,从商业模式、协议兼容性、安全信息快速处理、资源耗费等方面分析了区块链技术在我国目前电力辅助服务市场中应用的局限性,并提出相应建议。 展开更多
关键词 电力辅助服务 自动需求响应 区块链 安全交易
下载PDF
论《民法典各分编(草案)》“担保物权”的制度完善——以《民法典各分编(草案)》第一编物权为分析对象 被引量:56
15
作者 邹海林 《比较法研究》 CSSCI 北大核心 2019年第2期27-47,共21页
《民法典各分编(草案)》第一编物权对担保物权制度作了体系化的规定。因受"物债"不分的制度逻辑的影响,民法典草案在构造担保物权的一般规定以及类型化担保物权的制度结构方面,虽有改善《物权法》规定的某些制度的努力,但总... 《民法典各分编(草案)》第一编物权对担保物权制度作了体系化的规定。因受"物债"不分的制度逻辑的影响,民法典草案在构造担保物权的一般规定以及类型化担保物权的制度结构方面,虽有改善《物权法》规定的某些制度的努力,但总体上对2007年制定的《物权法》规定的担保物权的制度逻辑和体系梳理未有实质性的改善,仍普遍存在担保物权规范的制度逻辑不清晰、制度规范缺位或选择失当、担保物权制度的结构性缺陷等诸多问题。民法典草案首先应当摒弃自《担保法》以来我国发展担保物权制度体系的"物债"不分的制度逻辑,以现有的担保物权制度结构和体系为基础,重构担保物权的一般规定,构造逻辑关系相对清晰的担保物权规范,以完善作为民法典组成部分的担保物权制度。 展开更多
关键词 民法典 担保物权 制度逻辑 类型化担保物权 动产担保物权
原文传递
典权制度的比较研究——以德国担保用益和法、意不动产质为比较考察对象 被引量:39
16
作者 米健 《政法论坛》 CSSCI 北大核心 2001年第4期21-32,共12页
我国的典权与德国的担保用益或利用质押 ,以及法国与意大利的不动产质 ,是形式不同 ,但功能基本一致的法律制度。在我国民事立法中 ,应保留设置典权这一传统的法律制度 ,并注意不必再设置不动产质 ,以免重复立法。
关键词 典权 担保用益 利用质押 不动产质
原文传递
民法典物权编担保物权制度的完善 被引量:48
17
作者 程啸 《比较法研究》 CSSCI 北大核心 2018年第2期52-65,共14页
未来我国民法典物权编应维持现有的担保物权体系,不应将非典型担保纳入其中。担保物权人的优先受偿权不应随意遭受贬损。担保物权总则的内容应当予以完善,剔除那些并非担保物权共通规则的内容,增加对担保物权不可分性的规定,将担保物权... 未来我国民法典物权编应维持现有的担保物权体系,不应将非典型担保纳入其中。担保物权人的优先受偿权不应随意遭受贬损。担保物权总则的内容应当予以完善,剔除那些并非担保物权共通规则的内容,增加对担保物权不可分性的规定,将担保物权人物上代位权界定为法定债权质权,允许当事人约定担保物权的存续期间,明确担保物权因主债权诉讼时效届满而消灭,并认可混合共同担保中担保人之间的追偿权。就抵押权的完善而言,应当允许民办学校、幼儿园或医院以教育设施、医疗卫生设施等抵押,规定抵押权的效力及于抵押财产的从物、添附物,认可流押契约的效力,完善抵押权与租赁权的冲突规则,增加对共同抵押权的规定。未来我国民法典物权编应当增加金钱质押的规定,明确票据和仓单质权的设立要件及界定应收账款的范围,明确规定特定情形下债务人消灭留置权的权利,明确留置物被抵押时留置权也优先于抵押权,缩短债权人给予债务人的宽限期限。 展开更多
关键词 民法典 物权编 担保物权 抵押权 质权 留置权
原文传递
美国动产担保交易法与我国动产担保物权立法 被引量:35
18
作者 高圣平 《法学家》 CSSCI 北大核心 2006年第5期82-91,共10页
美国动产担保交易法引领着动产担保立法的世界潮流,其中所蕴含的概念和方法已被越来越多的国家作为动产担保法制改革的基础。我国物权立法中如何对待美国动产担保交易法的立法经验是我们目前应予面对的一大难点。文章从美国动产担保交... 美国动产担保交易法引领着动产担保立法的世界潮流,其中所蕴含的概念和方法已被越来越多的国家作为动产担保法制改革的基础。我国物权立法中如何对待美国动产担保交易法的立法经验是我们目前应予面对的一大难点。文章从美国动产担保交易法的制度特色着眼,参照他国的继受经验,提出了我国动产担保物权立法的应有态度。 展开更多
关键词 动产担保 美国统一商法典 物权法定主义
原文传递
公司代表越权担保的制度逻辑解析——以公司法第16条第1款为中心 被引量:39
19
作者 邹海林 《法学研究》 CSSCI 北大核心 2019年第5期63-82,共20页
自公司法第16条规定以来,我国理论和司法实务界对公司代表越权担保的私法效果问题又继续讨论了十多年,但解释上至今尚存不确定性。事实上,公司代表越权担保的私法效果,有其自身的制度逻辑,包括公司有为他人担保的能力、法人与法人机关... 自公司法第16条规定以来,我国理论和司法实务界对公司代表越权担保的私法效果问题又继续讨论了十多年,但解释上至今尚存不确定性。事实上,公司代表越权担保的私法效果,有其自身的制度逻辑,包括公司有为他人担保的能力、法人与法人机关之间固有的法秩序以及拒绝给付抗辩权的法理。现有的争论相当程度上脱离公司代表越权担保的制度逻辑,以致各种解释在路径、方法和结论上均有失妥当。理解和适用公司代表越权担保的私法效果,应以其制度逻辑为基础,不论有无违反公司法第16条第1款的情形,依照民法总则第61条的规定,公司代表以公司名义为相对人担保的,均产生归属于公司的私法效果;相对人请求公司承担责任时,公司得以相对人知道或者应当知道公司代表违反公司法第16条第1款为由拒绝承担责任。因有上述认识,我国司法实务有关公司代表越权担保的既有裁判路径应作出实质性的转变。 展开更多
关键词 公司担保 公司代表 越权行为 相对人 抗辩权
原文传递
公司担保合同行为的最佳行为范式何以形成——公司越权担保合同效力认定的逆向思维 被引量:35
20
作者 吴飞飞 《法学论坛》 CSSCI 北大核心 2015年第1期61-67,共7页
既有公司担保法律规范因为法律后果要件阙如、公司法与合同法的价值本位抵牾,若遵循"法条主义"之演绎推理解释路径,则不能获得具有解释结论唯一性与价值取向一致性的裁判结果。故而,在具体裁判环节中,法官应摒弃既有的"... 既有公司担保法律规范因为法律后果要件阙如、公司法与合同法的价值本位抵牾,若遵循"法条主义"之演绎推理解释路径,则不能获得具有解释结论唯一性与价值取向一致性的裁判结果。故而,在具体裁判环节中,法官应摒弃既有的"法条主义"之规范分析与价值分析路径,采用"后果主义"之"法律后果预测——行为评价"的逆向思维方式,承认公司担保规范存有法律漏洞与价值抵牾之客观事实,通过对《公司法》第16条直接立法目的即规范维护目标的解释,推导出其所欲求的最佳行为范式,并明确公司法定代表人、担保债权人对该最佳行为范式达成所分别负有的消极不越权义务与积极审查义务,再根据越权担保与无权代理在构成要件上的相似性,通过类推适用无权代理的方法填补公司担保规范的法律后果漏洞,进而引导实践中公司担保合同行为达致其最佳行为范式之要求。 展开更多
关键词 公司担保 《公司法》第16条 法条主义 后果主义 无权代理
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部