Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2016

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 7386

Full-Text Articles in Law

The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski Dec 2016

The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski

Touro Law Review

No abstract provided.


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


A Journey Through The Health Care Safety Net, Brietta R. Clark Dec 2016

A Journey Through The Health Care Safety Net, Brietta R. Clark

Saint Louis University Law Journal

No abstract provided.


Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin Dec 2016

Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin

Journal of Civil Law Studies

Traduire sans trahir, voilà la difficulté du traducteur comme celle du comparatiste. Comment garantir que les notions, une fois passées au filtre juridique, ne subissent pas une certaine altération, et ne perdent par là un peu d’elles-mêmes? Cet article s’intéresse donc à un genre particulier de traduction où des concepts universels se voient convertis en notions juridiques. Dans le cas précis de la philanthropie, la traduction se révèle moins aisée en droit civil qu’en common law au point de s’interroger de la capacité de ce premier à accueillir les mécanismes philanthropiques. Il en ressort alors que les traditions juridiques n’ont …


Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells Dec 2016

Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells

Journal of Civil Law Studies

No abstract provided.


Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur Dec 2016

Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur

Journal of Civil Law Studies

No abstract provided.


Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade Dec 2016

Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade

Journal of Civil Law Studies

The Federal Constitution of 1988 reinstated the democratic rule of law in Brazil. Based on fundamental rights, the “Citizen’s Constitution” shaped the model of a welfare State, which objectives consist in the construction of a free, just and solidary society, the eradication of poverty and substandard living conditions and the promotion of the well-being of all, without prejudice as to origin, race, sex, color, age and any other forms of discrimination. From this context, the constitutional idealization of family democracy emerges, specifically represented in this paper by the recognition of civil union be-tween people of the same sex as family …


Cover, Masthead & Contents Dec 2016

Cover, Masthead & Contents

Journal of Civil Law Studies

No abstract provided.


Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi Dec 2016

Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi

Journal of Civil Law Studies

La langue est souvent le vecteur de concepts et de visions propres à une société ou une partie de celle-ci ; c’est à travers la langue que se dévoilent les contradictions, le refus ou l’assentiment par rapport à de nouvelles réalités sociales et sociétales, qui peuvent être réglementées par le droit. Le droit, quant à lui, se sert de la langue pour nommer ces réalités et la terminologie juridique ou parajuridique devient d’une part un miroir qui reflète des tendances et des variations et d’autre part une loupe car elle amplifie les contrastes et les points de détail concernant certaines …


Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau Dec 2016

Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau

Journal of Civil Law Studies

No abstract provided.


Jersey: Vocabularies Of Coûtume And Code, Steven Pallot Dec 2016

Jersey: Vocabularies Of Coûtume And Code, Steven Pallot

Journal of Civil Law Studies

The Channel Islands were an integral part of the Duchy of Normandy until 1204 when King John lost Continental Normandy to the French King, Philip Augustus. Jersey and Guernsey did not submit to the jurisdiction of the French King but retained allegiance to the King in England as Duke of Normandy. The customary laws of the Islands retain their Norman root to this day in spite of strong legal and cultural influences from England in the 19thand 20Centuries. A rich legal vocabulary in both French and English has evolved in these mixed legal jurisdictions.

This article examines the …


A Dialogue To Conclude A Conference On Legal Translation:Synthèse À Deux Voix, Matthias Martin, Olivier Moréteau Dec 2016

A Dialogue To Conclude A Conference On Legal Translation:Synthèse À Deux Voix, Matthias Martin, Olivier Moréteau

Journal of Civil Law Studies

No abstract provided.


Mixed Legal Systems, East And West, Stephen Thomson Dec 2016

Mixed Legal Systems, East And West, Stephen Thomson

Journal of Civil Law Studies

No abstract provided.


China: Fragmented Rights And Tragedy Of Anticommons:Evidence From China’S Coastal Waters, Bing Shui Dec 2016

China: Fragmented Rights And Tragedy Of Anticommons:Evidence From China’S Coastal Waters, Bing Shui

Journal of Civil Law Studies

The ownership of, and rights to, coastal waters are exhibited on a cumulative scale ranging from commons-like to private use. As an example of a natural resource with complex and interlinked ecosystems, coastal waters give rise to many kinds of legal norms and pol-icy instruments. As shown by my investigation of China’s coastal waters, people are willing to pay for legal rights which guarantee exclusive access, regardless of the relatively high cost. The statistical data further reveals that, when coastal waters are divided, there is a negative correlation between fragmentation of the seas and sea-based production. Therefore, based on the …


Complete V.9 No.2 Dec 2016

Complete V.9 No.2

Journal of Civil Law Studies

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Nuisance And The Normative Boundaries Of Ownership, Christopher Essert Dec 2016

Nuisance And The Normative Boundaries Of Ownership, Christopher Essert

Tulsa Law Review

A nuisance is an unreasonable interference with an owner’s right to use and enjoy her land. The tort of nuisance must be understood if we are to understand the nature, scope, and justification of private property rights. As the latter task is among the most important ones facing legal and political philosophers in a democratic society, such as ours, the former is crucial. Yet, we lack anything like a viable theory of nuisance law. The two most prominent—the economic view and the physical-invasion view—both fail, doc-trinally and normatively. Things are so bad for nuisance that it has been called a …


Masthead Dec 2016

Masthead

Tulsa Law Review

No abstract provided.


Expansion Of Employee Wellness Programs Under Ppaca Creates Additional Barriers To Healthcare Insurance For Individuals With Disabilities, Amy B. Cheng Dec 2016

Expansion Of Employee Wellness Programs Under Ppaca Creates Additional Barriers To Healthcare Insurance For Individuals With Disabilities, Amy B. Cheng

Journal of Law and Health

There are many barriers to healthcare for the general population that has been documented throughout the years, with one particularly affected group being individuals with disabilities. One identified healthcare barrier for individuals with disabilities is the inability to gain access to the healthcare system through health insurance. While many attempts have been made to resolve this issue, serious problems have yet to be resolved. The Patient Protection Affordable Care Act (PPACA) attempted to solve the issue by expanding Health Insurance Portability and Accountability Act of 1996’s (HIPAA) current regulations on employee wellness programs. The relevant regulations govern employee wellness programs …