Home // CYBERLAWS
CYBERLAWS 2011, The Second International Conference on Technical and Legal Aspects of the e-Society
Type: conference
Notes: IARIA Conference.
Editors:
Lasse Berntzen, Vestfold University College - Tønsberg, Norway
Adolfo Villafiorita, Fondazione Bruno Kessler/ University of Trento, Italy
Mark Perry, University of Western Ontario/Faculty of Law/ Faculty of Science - London, Canada
ISBN: 978-1-61208-122-9
Location: Gosier, Guadeloupe, France
Dates: from February 23, 2011 to February 28, 2011
Articles: there are 7 articles
Object Security and Verification for Integrated Information and Computing Systems
Claus-Peter Rückemann and Birgit Frida Stefanie Gersbeck-Schierholz
keywords: Information Systems, Computing Systems, Security, Verification, Distributed Systems, Public Key Cryptography, High Performance Computing, Object Management
Mobile Phone Anomalous Behaviour Detection for Real-time Information Theft Tracking
Vrizlynn L. L. Thing, Perumal P. Subramaniam, Flora S. Tsai, and Tong-Wei Chua
keywords: Mobile device forensics, Android, information theft, anomaly detection, spyware
Clarifying Privacy in the Clouds
Thomas Margoni, Mark Perry, and Karthic Ramachandran
keywords: Privacy, cloud computing, compliance with legislation
Legal Consequences of Packet Inspection
Thomas Margoni and Mark Perry
keywords: Deep Packet Inspection; Telecommunication Inter- mediaries; ISP Liability; Safe Harbours.
From e-business to e-laws and e-judgments: 4,000 years of experience
Luigi Logrippo
keywords: cyberlaws; electronic commerce; electronic laws; electronic judgments; electronic courts; electronic enforcement; legal ontologies; completeness of law; consistency of law
Law Modeling with Ontological Support and BPMN: a Case Study
Aaron Ciaghi, Komminist Weldemariam, and Adolfo Villafiorita
keywords: Laws; Proedures; Modeling; Ontology; Business Processes; Public Administration.
A Novel Rainbow Table Sorting Method
Hwei-Ming Ying and Vrizlynn L. L. Thing
keywords: Digital forensics; password recovery; search optimization; time-memory tradeoff; cryptanalysis.