Home // CYBERLAWS

CYBERLAWS 2011, The Second International Conference on Technical and Legal Aspects of the e-Society

Type: conference

Notes: IARIA Conference.

Editors:
Lasse Berntzen, Vestfold University College - Tønsberg, Norway
Adolfo Villafiorita, Fondazione Bruno Kessler/ University of Trento, Italy
Mark Perry, University of Western Ontario/Faculty of Law/ Faculty of Science - London, Canada

ISBN: 978-1-61208-122-9

Location: Gosier, Guadeloupe, France

Dates: from February 23, 2011 to February 28, 2011

Articles: there are 7 articles

Object Security and Verification for Integrated Information and Computing Systems
Claus-Peter Rückemann and Birgit Frida Stefanie Gersbeck-Schierholz
keywords: Information Systems, Computing Systems, Security, Verification, Distributed Systems, Public Key Cryptography, High Performance Computing, Object Management

Mobile Phone Anomalous Behaviour Detection for Real-time Information Theft Tracking
Vrizlynn L. L. Thing, Perumal P. Subramaniam, Flora S. Tsai, and Tong-Wei Chua
keywords: Mobile device forensics, Android, information theft, anomaly detection, spyware

Clarifying Privacy in the Clouds
Thomas Margoni, Mark Perry, and Karthic Ramachandran
keywords: Privacy, cloud computing, compliance with legislation

Legal Consequences of Packet Inspection
Thomas Margoni and Mark Perry
keywords: Deep Packet Inspection; Telecommunication Inter- mediaries; ISP Liability; Safe Harbours.

From e-business to e-laws and e-judgments: 4,000 years of experience
Luigi Logrippo
keywords: cyberlaws; electronic commerce; electronic laws; electronic judgments; electronic courts; electronic enforcement; legal ontologies; completeness of law; consistency of law

Law Modeling with Ontological Support and BPMN: a Case Study
Aaron Ciaghi, Komminist Weldemariam, and Adolfo Villafiorita
keywords: Laws; Proedures; Modeling; Ontology; Business Processes; Public Administration.

A Novel Rainbow Table Sorting Method
Hwei-Ming Ying and Vrizlynn L. L. Thing
keywords: Digital forensics; password recovery; search optimization; time-memory tradeoff; cryptanalysis.