944 resultados para Lex Loci Protectionis
Resumo:
The article discusses the problems of applicable law to copyright infringements online. It firstly identifies the main problems related to the well established territoriality principle and the lex loci protectionis rules. Then; the discussion focuses on the "ubiquitous infringement" rule recently proposed by the American Law Institute (ALI) and the European Max Planck Group for Conflicts of Law and Intellectual Propoperty (CLIP). The author strongly welcomes a compromise between the territoriality and universality approaches suggested in respect of ubiquitous infringement cases. At the same time; the paper draws the attention that the interests of "good faith" online service providers (such as legal certainty and foreseeability) have been until now underestimated and invites to take these interests into account when merging the projects into a common international proposal.
Resumo:
Enforcement of copyright online and fighting online “piracy” is a high priority on the EU agenda. Private international law questions have recently become some of the most challenging issues in this area. Internet service providers are still uncertain how the Brussels I Regulation (Recast) provisions would apply in EU-wide copyright infringement cases and in which country they can be sued for copyright violations. Meanwhile, because of the territorial approach that still underlies EU copyright law, right holders are unable to acquire EU-wide relief for copyright infringements online. This article first discusses the recent CJEU rulings in the Pinckney and Hejduk cases and argues that the “access approach” that the Court adopted for solving jurisdiction questions could be quite reasonable if it is applied with additional legal measures at the level of substantive law, such as the targeting doctrine. Secondly, the article explores the alternatives to the currently established lex loci protectionis rule that would enable right holders to get EU-wide remedies under a single applicable law. In particular, the analysis focuses on the special applicable law rule for ubiquitous copyright infringements, as suggested by the CLIP Group, and other international proposals.
Resumo:
Since 1994, Canada, the United Kingdom and Australia have adopted new choice of law rules for cross-border torts that, in different ways, centre on the application of the law of the place where the tort occurred (the lex loci delicti). All three countries abandoned some species of the rule in Phillips v Eyre, which required some reference to the law of the forum (the lex fori) as well as the lex loci delicti. However, predictions were made that, where possible, courts in these countries would continue to show a strong inclination to apply the lex fori in cross-border tort cases - and would use a range of homing devices to do so. A comprehensive survey and analysis of the cases that have been decided under the Australian, British and Canadian lex loci delicti regimes suggests that courts in these countries do betray a homing instinct, but one that has actually been tightly restrained by appeal courts. Where application of the lex fori was formally allowed by use of a 'flexible exception' in Canada and the United Kingdom, this has been contained by courts of first appeal. Indeed, only the continuing characterization of the assessment of damages as a procedural question in Canada and the United Kingdom, seems to remain as a significant homing device for courts in these countries. © 2006 Oxford University Press.
Resumo:
LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.
Resumo:
This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
This work examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this article, experiments were conducted to find solutions of equation systems describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the authors know, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
Cytogenetic and loss of heterozygosity (LOH) studies have long indicated the presence of a tumor suppressor gene (TSG) on 9p involved in the development of melanoma. Although LOH at 9p has been reported in approximately 60% of melanoma tumors, only 5-10% of these tumors have been shown to carry CDKN2A mutations, raising the possibility that another TSG involved in melanoma maps to chromosome 9p. To investigate this possibility, a panel of 37 melanomas derived from 35 individuals was analyzed for CDKN2A mutations by single-strand conformation polymorphism analysis and sequencing. The melanoma samples were then typed for 15 markers that map to 9p13-24 to investigate LOH trends in this region. In those tumors demonstrating retention of heterozygosity at markers flanking CDKN2A and LOH on one or both sides of the gene, multiplex microsatellite PCR was performed to rule out homozygous deletion of the region encompassing CDKN2A. CDKN2A mutations were found in tumors from 5 patients [5 (14%) of 35], 4 of which demonstrated LOH across the entire region examined. The remaining tumor with no observed LOH carried two point mutations, one on each allele. Although LOH was identified at one or more markers in 22 (59%) of 37 melanoma tumors corresponding to 20 (57%) of 35 individuals, only 11 tumors from 9 individuals [9 (26%) of 35] demonstrated LOH at D9S942 and D9S1748 the markers closest to CDKN2A. Of the remaining 11 tumors with LOH 9 demonstrated LOH at two or more contiguous markers either centromeric and/or telomeric to CDKN2A while retaining heterozygosity at several markers adjacent to CDKN2A. Multiplex PCR revealed one tumor carried a homozygous deletion extending from D9S1748 to the IFN-alpha locus. In the remaining eight tumors, multiplex PCR demonstrated that the observed heterozygosity was not attributable to homozygous deletion and stromal contamination at D9S1748, D9S942, or D9S974, as measured by comparative amplification strengths, which indicates that retention of heterozygosity with flanking LOH does not always indicate a homozygous deletion. This report supports the conclusions of previous studies that a least two TSGs involved in melanoma development in addition to CDKN2A may reside on chromosome 9p.
Resumo:
The Capricorn silvereye (Zosterops lateralis chlorocephalus) is ideally suited to investigating the genetic basis of body size evolution. We have isolated and characterized a set of microsatellite markers for this species. Seven out of 11 loci were polymorphic. The number of alleles detected ranged from two to five and observed heterozygosities between 0.12 and 0.67. One locus, ZL49, was found to be sex-linked. This moderate level of diversity is consistent with that expected in an isolated, island population.