排序方式: 共有36条查询结果,搜索用时 15 毫秒
11.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions. 相似文献
12.
全立新 《长沙民政职业技术学院学报》2003,10(1):67-69
文中对Sybase SQL Anywhere的故障、日志作详细阐述,并给出了对数据备份和恢复的多种操作方法。 相似文献
13.
首先分析了网络取证的基本概念,然后介绍了网络取证系统的分析过程,最后提出和设计了一个分布式网络实时取证系统的实现模型。 相似文献
14.
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there are various options that control which information is included in the logs. This paper introduces the notion of the ideal log setting necessary for an effective reconstruction process in database forensics. The paper provides a survey of the default logging preferences in some of the popular database management systems and identifies the information that a database log should contain in order to be useful for reconstruction. The challenges that may be encountered in storing the information as well as ways of overcoming the challenges are discussed. Possible logging preferences that may be considered as the ideal log setting for the popular database systems are also proposed. In addition, the paper relates the identified requirements to the three dimensions of reconstruction in database forensics and points out the additional requirements and/or techniques that may be required in the different dimensions. 相似文献
15.
程序和实质:鉴定结论发挥证明作用的双重保障——以物证鉴定为例 总被引:2,自引:0,他引:2
鉴定是鉴定结论的基础。意欲鉴定结论发挥应有的证明作用,除了对鉴定活动施以必要的程序规范外,还必需对鉴定的实质运作加以干预——即对鉴定佐以质量控制。但是,我国目前有关鉴定制度的改革及完善,忽略了鉴定的质量控制及鉴定方法的标准化问题。此外,本文还分析了现行诉讼制度下,鉴定结论的质证得以落实并最终发挥证明作用的三大要素:鉴定结论的质证主体要素、质证的程序性保障及质证的内容选择。 相似文献
16.
17.
刘丹 《山西省政法管理干部学院学报》2007,20(2):40-43
域名是一种用于互联网上识别和定位计算机的地址系统。域名应归入到知识产权的范畴。域名注册机构一般不承担因域名争议引起的法律责任。域名与商标权和商号权之间易产生法律冲突。驰名商标的商标权可以延伸至域名权,将普通商标抢注为域名者主观上存在故意时构成侵犯商标权行为,巧合雷同、非商业性使用、域名注册在先、合理使用行为不侵犯商标权。 相似文献
18.
陈炜 《长沙民政职业技术学院学报》2006,13(2):116-118
在对大型数据库进行管理和维护操作时,经常会遇到操作速度缓慢、磁盘空间不足以及数据恢复等问题,这些问题的关键常常和事务日志有关。正确维护和处理好事务日志可确保数据库系统安全及高效运转。 相似文献
19.
Evangelos Dragonas MSc Costas Lambrinoudakis PhD Michael Kotsis MSc 《Journal of forensic sciences》2023,68(6):2002-2011
CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to use proprietary file systems, which frequently hinders a complete examination. HIKVISION is a well-known manufacturer of such devices that typically ships its products with its proprietary file system. The HIKVISION file system has been analyzed before but that research has focused on the recovery of video footage. In this paper, the HIKVISION file system is being revisited regarding the log records it stores. More specifically, these log records are thoroughly examined to uncover both their structure and meaning. These unexplored pieces of evidence remain unexploited by major commercial forensic software, yet they can contain critical information for an investigation. To further assist digital forensic examiners with their analysis, a Python utility, namely the Hikvision Log Analyzer, was developed as part of this study that can automate part of the process. 相似文献
20.
王娜 《山东行政学院学报》2009,(6):74-75
认证技术是保证电子商务安全的重要技术手段,是防止信息被篡改、删除、重放和伪造的一种有效方法,它具有被验证的能力,使接收者能够识别和确认消息的真伪。常用的安全认证技术主要有数字证书、数字签名、数字信封等。文中分析了电子商务的这几种认证技术。 相似文献