Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (1721)
- Constitutional Law (1287)
- Education (1281)
- Arts and Humanities (1161)
- International Law (1136)
-
- Intellectual Property Law (1107)
- Criminal Law (847)
- Law and Society (627)
- Environmental Law (626)
- Civil Rights and Discrimination (621)
- Comparative and Foreign Law (608)
- Life Sciences (576)
- Courts (536)
- Health Law and Policy (520)
- Legal Education (515)
- Human Rights Law (488)
- Legislation (450)
- Public Affairs, Public Policy and Public Administration (434)
- Criminal Procedure (430)
- Legal Profession (423)
- State and Local Government Law (397)
- Supreme Court of the United States (392)
- Business Organizations Law (390)
- Law and Economics (382)
- Administrative Law (355)
- First Amendment (339)
- Business (334)
- Labor and Employment Law (332)
- Family Law (325)
- Institution
-
- Selected Works (1652)
- California State University, Monterey Bay (1097)
- University of Georgia School of Law (660)
- Brigham Young University Law School (614)
- Fordham Law School (402)
-
- St. John's University School of Law (378)
- Duke Law (352)
- University of Pennsylvania Carey Law School (284)
- University of Michigan Law School (282)
- William & Mary Law School (266)
- University of Richmond (256)
- Columbia Law School (253)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (239)
- University of Chicago Law School (223)
- Osgoode Hall Law School of York University (206)
- Maurer School of Law: Indiana University (203)
- Touro University Jacob D. Fuchsberg Law Center (188)
- Notre Dame Law School (186)
- Brooklyn Law School (182)
- Case Western Reserve University School of Law (176)
- American University Washington College of Law (172)
- University of Washington School of Law (169)
- Seton Hall University (168)
- UC Law SF (165)
- Roger Williams University (162)
- University of Wollongong (159)
- Vanderbilt University Law School (156)
- Loyola University Chicago, School of Law (154)
- New York Law School (151)
- Maurice A. Deane School of Law at Hofstra University (149)
- Keyword
-
- U.S. Land Patents (474)
- Agriculture (455)
- Law (268)
- Natural resources (249)
- Surveys (241)
-
- Land patents (238)
- Land grants (237)
- Cultural resources (234)
- Historical resources (234)
- Land tenure (234)
- Early California maps (233)
- Copyright (196)
- Land use (196)
- Diseños (193)
- Expediente (193)
- Livestock (191)
- California ranchos (189)
- Plats (189)
- Intellectual property (187)
- Irrigated land (165)
- Crop acres (164)
- Crop yield (164)
- Dairying (164)
- Gross farm return (164)
- Poultry (164)
- Supreme Court (164)
- Constitutional law (148)
- First Amendment (122)
- Human rights (112)
- Privacy (112)
- Publication
-
- Faculty Scholarship (707)
- Pre-1872 Land Patents in the Basins (555)
- Utah Court of Appeals Briefs (2007– ) (411)
- Journal of Intellectual Property Law (297)
- Articles (295)
-
- Georgia Journal of International & Comparative Law (256)
- The Catholic Lawyer (247)
- Faculty Publications (225)
- All Faculty Scholarship (176)
- Scholarly Works (174)
- Fordham Urban Law Journal (170)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (159)
- Touro Law Review (156)
- Utah Supreme Court Briefs (2000– ) (127)
- Research Collection Yong Pung How School Of Law (110)
- Fordham Law Review (108)
- Journal Articles (107)
- Student Works (107)
- Individual Ranchos in Monterey and SLO Counties (105)
- Law Faculty Publications (102)
- Faculty Articles (91)
- San Luis Obispo Crop Reports (84)
- Monterey County Crop Reports (82)
- Publications (78)
- Akron Intellectual Property Journal (77)
- Nevada Supreme Court Summaries (77)
- Hallowed Secularism (76)
- Florida Law Review (74)
- GW Law Faculty Publications & Other Works (70)
- Student Senate Enrolled Legislation (70)
Articles 241 - 270 of 16783
Full-Text Articles in Law
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat
The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat
Coase-Sandor Working Paper Series in Law and Economics
No abstract provided.
Waters Of The United States, Roni A. Elias
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
International Journal of Nuclear Security
This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London
The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London
Tulsa Law Review
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Beps And The New International Tax Order, Allison Christians
Beps And The New International Tax Order, Allison Christians
BYU Law Review
Nations across the world are currently engaged in a coordinated international effort, ostensibly to curb excessive tax avoidance by the world’s biggest multinational companies. This Article contends, however, that the most likely impact will be to entrench a monopoly held by a small number of rich countries over the policymaking processes that created the tax avoidance problem to begin with. To examine this contention and probe possible solutions to it, the Article considers the legal and institutional components of the coordination project, by situating them historically and analyzing their multi-functionality as both norm diffusion and institutional reinforcement mechanisms. The Article …
Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing
Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing
BYU Law Review
Label contradicts reality for the U.S. international corporate tax system. The U.S. system is typically labeled as a worldwide tax system with a statutory rate of 35%, both uncommon features among our trading partners. Yet these markers of the U.S. tax system do not accurately describe reality, where multinational firms routinely face far lower effective tax rates and little, if any, tax is collected on foreign income. Understanding this discrepancy between label and reality is essential to evaluate recent policy debates surrounding corporate inversions and the competitiveness of the U.S. international tax system. Although there is an essential policy tradeoff …
The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian
The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian
BYU Law Review
The taxation of private equity managers’ share of funds’ profits—the twenty percent “carried interest”—received much attention in academic literature and popular discourse. Much has been said and written about the fact that fund managers’ profits are taxed at preferred rates. But what about the other eighty percent of funds’ profits? This Article theorizes that the bulk of such profits are never taxed. This is a result of a combination of three factors: First, private equity, venture capital, and hedge funds (collectively, Private Investment Funds, or “PIFs”) are major actors in cross-border investment activity. This enables PIFs to take advantage of …
Developing Countries In An Age Of Transparency And Disclosure, Diane Ring
Developing Countries In An Age Of Transparency And Disclosure, Diane Ring
BYU Law Review
No abstract provided.
The Foreign Tax Credit War, Bret Wells
The Foreign Tax Credit War, Bret Wells
BYU Law Review
The government has been involved in a sustained war against objectionable foreign tax credit transactions. This war has caused the U.S. foreign tax credit regime to be riddled with complexity that spawns incoherent outcomes. The complexity contained in section 901 was created due to a legitimate concern: the threats posed by objectionable transactions that artificially generate excess foreign tax credits represent real policy problems. Since at least 1975, Congress and the Treasury Department have been convinced that the cross-crediting of excess foreign tax credits arising from “objectionable transactions” required a response in addition to simply relying on section 904. Thus, …
Biodiversity Beyond National Jurisdiction: Current Debate And Indonesia's Interest, Gulardi Nurbintoro, Haryo Budi Nugroho
Biodiversity Beyond National Jurisdiction: Current Debate And Indonesia's Interest, Gulardi Nurbintoro, Haryo Budi Nugroho
Indonesia Law Review
The drafters of the 1982 UN Convention on the Law of the Sea (UNCLOS) have left behind a lacunae in terms of the regulations concerning Biodiversity in the Areas Beyond National Jurisdiction (BBNJ). As living organisms are found in the deep seabed in areas beyond national jurisdiction, as well as the utilization of marine genetic resources beyond national jurisdiction for commercial purposes, States are currently deliberating on the proper regime in dealing with the management and exploitation of the biodiversity. Some States argue that Part XI UNCLOS applies hence BBNJ is also part of the Common Heritage of Mankind. On …
Finding A Fair Land Dispute Settlement Mechanism Between Adat Law Community Vs. Investor, Ratih Lestarini
Finding A Fair Land Dispute Settlement Mechanism Between Adat Law Community Vs. Investor, Ratih Lestarini
Indonesia Law Review
Land utilization for investment in local areas raises various land related problems that ends with conflicts within the community. A conflict that occurs, usually begins with the management of communal land “tanah ulayat” within the adat law community environment, and in this case, land utilization that is managed by the third party (investors). The basic problem is the difference of perception and expectations toward the company that exists in the land which is claimed by the community. Both parties have their own claim on the land based on each legal systems, in this situation adat law or local law faced …
Debunking The Relationship Between Law And Capitalism: How Corporate Governance Failures Contribute To The Financial Crisis In Indonesia?, Najmu Laila Sopian, Muhammad Yahdi Salampessy
Debunking The Relationship Between Law And Capitalism: How Corporate Governance Failures Contribute To The Financial Crisis In Indonesia?, Najmu Laila Sopian, Muhammad Yahdi Salampessy
Indonesia Law Review
The recent global financial catastrophe has raised questions about the relationship between corporate governance and the crisis. Many scholars attribute the crisis to the corporate failure and the Anglo-Saxon model of capitalism. Much of the literatures, however, tend to focus on examining the issue of financial crisis in the developed economy. Following up this line of literatures, this paper will extend the discussion of the role of corporate governance in financial crisis in the developing world. Using Indonesia as a case study, this paper will look at evidence that has emerged from the recent financial crisis regarding the failures of …
The Effectiveness Of National Collective Management Organization Regulation, Agus Sardjono, Brian Amy Prastyo, Derezka G. Larasati
The Effectiveness Of National Collective Management Organization Regulation, Agus Sardjono, Brian Amy Prastyo, Derezka G. Larasati
Indonesia Law Review
Law Number 28 of 2014 concerning Copyright in Article 89 provides for two National Collective Management Organizations (briefly referred to as LMKN), both of which represent the interests of Authors and the Owners of Related Rights. Both of the said organizations possess the authority to impose, collect, and distribute royalty obtained from commercial users. The Minister of Law and Human Rights inaugurated commissioners assigned to the said Authors’ LMKN and Related Rights LMKN. The LMKN is bound to have an operational effect on previously existing LMKs in Indonesia. Therefore, the objective of this study is to assess whether the existing …