901 resultados para Rule enforcement
Resumo:
With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access control specification Domain-Type Enforcement Language to the Java Security Manager, primarily for pedagogical purposes. The implementation of the Java Security Manager was explored in depth, and various techniques to work around its inherent limitations were explored and partially implemented, although some of these workarounds do not appear in the current version of the compiler because they would have compromised cross-platform compatibility. The current version of the compiler and implementation details of the Java Security Manager are discussed in depth.
Resumo:
GPL enforcement is successful in Europe. In several court decisions and out of court settlements the license conditions of the GPL have been successfully enforced. In particular, embedded systems are the main focus of such compliance activities. The article describes the practice of enforcement activities and the legal prerequisites under the application of German law.
Resumo:
Der Beitrag schildert an Beispielen aus der Rechtsprechung des Europäischen Gerichtshofs (EuGH), wie sich ausgehend von der Regel, dass jeder Mitgliedstaat das Gemeinschaftsrecht nach eigenem nationalstaatlichen Verwaltungsrecht vollzieht (sog. Vollzugskompetenz der Mitgliedstaaten) in den letzten Jahren gleichwohl Ansätze eines gemeinsamen Europäischen Verwaltungsrechts entwickelt haben. Hierbei werden zunächst die Wirkungsweisen des Effektivitätsgebotes und des Diskriminierungsverbotes erläutert, die als Grund legende Prinzipen dem nationalen Verwaltungsvollzug zugrunde liegen müssen. Daneben erläutert der Beitrag als weitere systematische Grundstrukturen, die für eine gleichmäßige Anwendung des Verwaltungsrechts in allen Mitgliedstaaten kennzeichnend sind, exemplarisch den Grundsatz der Verhältnismäßigkeit, den Grundsatz des Vertrauensschutzes und den Grundsatz der Rechtssicherheit. Im Fazit konstatiert der Verfasser eine durch den EuGH forcierte Rechtsfortbildung, die sich deutlich in Richtung auf ein sich ständig verdichtendes Europäisches Verwaltungsrecht weiterentwickelt.
Resumo:
Enforcement of copyright online and fighting online “piracy” is a high priority on the EU agenda. Private international law questions have recently become some of the most challenging issues in this area. Internet service providers are still uncertain how the Brussels I Regulation (Recast) provisions would apply in EU-wide copyright infringement cases and in which country they can be sued for copyright violations. Meanwhile, because of the territorial approach that still underlies EU copyright law, right holders are unable to acquire EU-wide relief for copyright infringements online. This article first discusses the recent CJEU rulings in the Pinckney and Hejduk cases and argues that the “access approach” that the Court adopted for solving jurisdiction questions could be quite reasonable if it is applied with additional legal measures at the level of substantive law, such as the targeting doctrine. Secondly, the article explores the alternatives to the currently established lex loci protectionis rule that would enable right holders to get EU-wide remedies under a single applicable law. In particular, the analysis focuses on the special applicable law rule for ubiquitous copyright infringements, as suggested by the CLIP Group, and other international proposals.
Resumo:
We propose a simple implementation of Black’s (1988) elegant rule for discounting uncertain future cash flows. Black’s rule avoids the thorny problem of estimating an appropriate risk-adjusted discount rate. Instead, the rule calls for discounting conditional mean cash flows at appropriate riskless interest rates. Our contribution in this article is to describe and illustrate a method of estimating the conditional mean cash flows called for in Black’s rule. The method is quite flexible with respect to the types of information available concerning the distributions of future cash flows. We argue that this approach to computing present values offers a theoretically sound and generally feasible addition to the toolbox of financial managers.
Resumo:
OBJECTIVE Only limited data exists in terms of the incidence of intracranial bleeding (ICB) in patients with mild traumatic brain injury (MTBI). METHODS We retrospectively identified 3088 patients (mean age 41 range (7-99) years) presenting with isolated MTBI and GCS 14-15 at our Emergency Department who had undergone cranial CT (CCT) between 2002 and 2011. Indication for CCT was according to the "Canadian CT head rules." Patients with ICB were either submitted for neurosurgical treatment or kept under surveillance for at least 24 hours. Pearson's correlation coefficient was used to correlate the incidence of ICB with age, gender, or intake of coumarins, platelet aggregation inhibitors, or heparins. RESULTS 149 patients (4.8%) had ICB on CCT. No patient with ICB died or deteriorated neurologically. The incidence of ICB increased with age and intake of anticoagulants without clinically relevant correlation (R = 0.11; P < 0.001; R = -0.06; P < 0.001). CONCLUSION Our data show an incidence of 4.8% for ICB after MTBI. However, neurological deterioration after MTBI seems to be rare, and the need for neurosurgical intervention is only required in selected cases. The general need for CCT in patients after MTBI is therefore questionable, and clinical surveillance may be sufficient when CCT is not available.