Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2016

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 7387

Full-Text Articles in Law

The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski Dec 2016

The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski

Touro Law Review

No abstract provided.


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


A Journey Through The Health Care Safety Net, Brietta R. Clark Dec 2016

A Journey Through The Health Care Safety Net, Brietta R. Clark

Saint Louis University Law Journal

No abstract provided.


Inequity In Private Child Custody Litigation, Dale Margolin Cecka Dec 2016

Inequity In Private Child Custody Litigation, Dale Margolin Cecka

City University of New York Law Review

No abstract provided.


Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin Dec 2016

Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin

Journal of Civil Law Studies

Traduire sans trahir, voilà la difficulté du traducteur comme celle du comparatiste. Comment garantir que les notions, une fois passées au filtre juridique, ne subissent pas une certaine altération, et ne perdent par là un peu d’elles-mêmes? Cet article s’intéresse donc à un genre particulier de traduction où des concepts universels se voient convertis en notions juridiques. Dans le cas précis de la philanthropie, la traduction se révèle moins aisée en droit civil qu’en common law au point de s’interroger de la capacité de ce premier à accueillir les mécanismes philanthropiques. Il en ressort alors que les traditions juridiques n’ont …


Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells Dec 2016

Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells

Journal of Civil Law Studies

No abstract provided.


Introduction, Angela Olivia Burton Dec 2016

Introduction, Angela Olivia Burton

City University of New York Law Review

No abstract provided.


Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur Dec 2016

Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur

Journal of Civil Law Studies

No abstract provided.


Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade Dec 2016

Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade

Journal of Civil Law Studies

The Federal Constitution of 1988 reinstated the democratic rule of law in Brazil. Based on fundamental rights, the “Citizen’s Constitution” shaped the model of a welfare State, which objectives consist in the construction of a free, just and solidary society, the eradication of poverty and substandard living conditions and the promotion of the well-being of all, without prejudice as to origin, race, sex, color, age and any other forms of discrimination. From this context, the constitutional idealization of family democracy emerges, specifically represented in this paper by the recognition of civil union be-tween people of the same sex as family …


Front Matter Dec 2016

Front Matter

City University of New York Law Review

No abstract provided.


Afterword, Matthew I. Fraidin Dec 2016

Afterword, Matthew I. Fraidin

City University of New York Law Review

No abstract provided.


Family Defense And The Disappearing Problem-Solving Court, Jane M. Spinak Dec 2016

Family Defense And The Disappearing Problem-Solving Court, Jane M. Spinak

City University of New York Law Review

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover, Masthead & Contents Dec 2016

Cover, Masthead & Contents

Journal of Civil Law Studies

No abstract provided.


Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi Dec 2016

Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi

Journal of Civil Law Studies

La langue est souvent le vecteur de concepts et de visions propres à une société ou une partie de celle-ci ; c’est à travers la langue que se dévoilent les contradictions, le refus ou l’assentiment par rapport à de nouvelles réalités sociales et sociétales, qui peuvent être réglementées par le droit. Le droit, quant à lui, se sert de la langue pour nommer ces réalités et la terminologie juridique ou parajuridique devient d’une part un miroir qui reflète des tendances et des variations et d’autre part une loupe car elle amplifie les contrastes et les points de détail concernant certaines …


Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau Dec 2016

Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau

Journal of Civil Law Studies

No abstract provided.