Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2016

Discipline
Institution
Keyword
Publication
Publication Type

Articles 241 - 270 of 16783

Full-Text Articles in Law

Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat Dec 2016

The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat

Coase-Sandor Working Paper Series in Law and Economics

No abstract provided.


Waters Of The United States, Roni A. Elias Dec 2016

Waters Of The United States, Roni A. Elias

Tulsa Law Review

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London Dec 2016

The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London

Tulsa Law Review

No abstract provided.


Masthead Dec 2016

Masthead

Tulsa Law Review

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Beps And The New International Tax Order, Allison Christians Dec 2016

Beps And The New International Tax Order, Allison Christians

BYU Law Review

Nations across the world are currently engaged in a coordinated international effort, ostensibly to curb excessive tax avoidance by the world’s biggest multinational companies. This Article contends, however, that the most likely impact will be to entrench a monopoly held by a small number of rich countries over the policymaking processes that created the tax avoidance problem to begin with. To examine this contention and probe possible solutions to it, the Article considers the legal and institutional components of the coordination project, by situating them historically and analyzing their multi-functionality as both norm diffusion and institutional reinforcement mechanisms. The Article …


Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing Dec 2016

Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing

BYU Law Review

Label contradicts reality for the U.S. international corporate tax system. The U.S. system is typically labeled as a worldwide tax system with a statutory rate of 35%, both uncommon features among our trading partners. Yet these markers of the U.S. tax system do not accurately describe reality, where multinational firms routinely face far lower effective tax rates and little, if any, tax is collected on foreign income. Understanding this discrepancy between label and reality is essential to evaluate recent policy debates surrounding corporate inversions and the competitiveness of the U.S. international tax system. Although there is an essential policy tradeoff …


The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian Dec 2016

The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian

BYU Law Review

The taxation of private equity managers’ share of funds’ profits—the twenty percent “carried interest”—received much attention in academic literature and popular discourse. Much has been said and written about the fact that fund managers’ profits are taxed at preferred rates. But what about the other eighty percent of funds’ profits? This Article theorizes that the bulk of such profits are never taxed. This is a result of a combination of three factors: First, private equity, venture capital, and hedge funds (collectively, Private Investment Funds, or “PIFs”) are major actors in cross-border investment activity. This enables PIFs to take advantage of …


Developing Countries In An Age Of Transparency And Disclosure, Diane Ring Dec 2016

Developing Countries In An Age Of Transparency And Disclosure, Diane Ring

BYU Law Review

No abstract provided.


The Foreign Tax Credit War, Bret Wells Dec 2016

The Foreign Tax Credit War, Bret Wells

BYU Law Review

The government has been involved in a sustained war against objectionable foreign tax credit transactions. This war has caused the U.S. foreign tax credit regime to be riddled with complexity that spawns incoherent outcomes. The complexity contained in section 901 was created due to a legitimate concern: the threats posed by objectionable transactions that artificially generate excess foreign tax credits represent real policy problems. Since at least 1975, Congress and the Treasury Department have been convinced that the cross-crediting of excess foreign tax credits arising from “objectionable transactions” required a response in addition to simply relying on section 904. Thus, …


Biodiversity Beyond National Jurisdiction: Current Debate And Indonesia's Interest, Gulardi Nurbintoro, Haryo Budi Nugroho Dec 2016

Biodiversity Beyond National Jurisdiction: Current Debate And Indonesia's Interest, Gulardi Nurbintoro, Haryo Budi Nugroho

Indonesia Law Review

The drafters of the 1982 UN Convention on the Law of the Sea (UNCLOS) have left behind a lacunae in terms of the regulations concerning Biodiversity in the Areas Beyond National Jurisdiction (BBNJ). As living organisms are found in the deep seabed in areas beyond national jurisdiction, as well as the utilization of marine genetic resources beyond national jurisdiction for commercial purposes, States are currently deliberating on the proper regime in dealing with the management and exploitation of the biodiversity. Some States argue that Part XI UNCLOS applies hence BBNJ is also part of the Common Heritage of Mankind. On …


Finding A Fair Land Dispute Settlement Mechanism Between Adat Law Community Vs. Investor, Ratih Lestarini Dec 2016

Finding A Fair Land Dispute Settlement Mechanism Between Adat Law Community Vs. Investor, Ratih Lestarini

Indonesia Law Review

Land utilization for investment in local areas raises various land related problems that ends with conflicts within the community. A conflict that occurs, usually begins with the management of communal land “tanah ulayat” within the adat law community environment, and in this case, land utilization that is managed by the third party (investors). The basic problem is the difference of perception and expectations toward the company that exists in the land which is claimed by the community. Both parties have their own claim on the land based on each legal systems, in this situation adat law or local law faced …


Debunking The Relationship Between Law And Capitalism: How Corporate Governance Failures Contribute To The Financial Crisis In Indonesia?, Najmu Laila Sopian, Muhammad Yahdi Salampessy Dec 2016

Debunking The Relationship Between Law And Capitalism: How Corporate Governance Failures Contribute To The Financial Crisis In Indonesia?, Najmu Laila Sopian, Muhammad Yahdi Salampessy

Indonesia Law Review

The recent global financial catastrophe has raised questions about the relationship between corporate governance and the crisis. Many scholars attribute the crisis to the corporate failure and the Anglo-Saxon model of capitalism. Much of the literatures, however, tend to focus on examining the issue of financial crisis in the developed economy. Following up this line of literatures, this paper will extend the discussion of the role of corporate governance in financial crisis in the developing world. Using Indonesia as a case study, this paper will look at evidence that has emerged from the recent financial crisis regarding the failures of …


The Effectiveness Of National Collective Management Organization Regulation, Agus Sardjono, Brian Amy Prastyo, Derezka G. Larasati Dec 2016

The Effectiveness Of National Collective Management Organization Regulation, Agus Sardjono, Brian Amy Prastyo, Derezka G. Larasati

Indonesia Law Review

Law Number 28 of 2014 concerning Copyright in Article 89 provides for two National Collective Management Organizations (briefly referred to as LMKN), both of which represent the interests of Authors and the Owners of Related Rights. Both of the said organizations possess the authority to impose, collect, and distribute royalty obtained from commercial users. The Minister of Law and Human Rights inaugurated commissioners assigned to the said Authors’ LMKN and Related Rights LMKN. The LMKN is bound to have an operational effect on previously existing LMKs in Indonesia. Therefore, the objective of this study is to assess whether the existing …