Request for protection of legality

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adjusting a Program Transformation for Legality

Program transformations are one of the most valuable compiler techniques to improve parallelism or data locality. However, restructuring compilers have a hard time coping with data dependences. A typical solution is to focus on program parts where the dependences are simple enough to enable any transformation. For more complex problems is only addressed the question of checking whether a transf...

متن کامل

Advertising Legality Recognition

As online marketing and advertising keep growing on the Internet, a large amount of advertisements are presented to consumers. How consumers, advertisers and the authorities identify false and overstated advertisements becomes a critical issue. In this paper, we address this problem, and propose various classification models to detect illegal advertisements. Illegal advertisement lists announce...

متن کامل

Legality and legitimacy of exporting democracy

The George W. Bush jr administration explicitly declared its aim to spread democracy militarily. Is such an intention legal under current international law, norms and institutions? If one proves it to be at odds with the criterion of legality – since it clearly contradicts one of the main pillars of the UN Charter, i.e. the principle of non-interference –, can it be justified with recourse to t...

متن کامل

Towards stateless, client-side driven Cross-Site Request Forgery protection for Web applications

Cross-site request forgery (CSRF) is one of the dominant threats in the Web application landscape. In this paper, we present a lightweight and stateless protection mechanism that can be added to an existing application without requiring changes to the application’s code. The key functionality of the approach, which is based on the double-submit technique, is purely implemented on the client-sid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Zbornik radova Pravnog fakulteta, Novi Sad

سال: 2016

ISSN: 0550-2179

DOI: 10.5937/zrpfns50-10940