-
3
-
-
24344446965
-
Computer forensics
-
Allan W. Computer forensics. IEEE Security and Privacy 2005;3(4): 59-62.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 59-62
-
-
Allan, W.1
-
4
-
-
77955562282
-
-
Buyya R, Yeo C, Venugopal S, Brobery J, Brandic I. Cloud computing and emerging IT platforms: vision, hype and reality for delivering computing a 5th utility.
-
Cloud Computing and Emerging IT Platforms: Vision, Hype and Reality for Delivering Computing A 5th Utility
-
-
Buyya, R.1
Yeo, C.2
Venugopal, S.3
Brobery, J.4
Brandic, I.5
-
6
-
-
77955565902
-
-
CJA. UK Criminal Justice Act 2003
-
CJA. UK Criminal Justice Act 2003, http://www.opsi.gov.uk; 2003.
-
(2003)
-
-
-
7
-
-
77955588240
-
-
Clr. R. v. Spiby. Criminal Law Review; 1991:199
-
Clr. R. v. Spiby. Criminal Law Review; 1991:199.
-
-
-
-
8
-
-
77955580278
-
-
CMA. UK Computer Misuse Act 1990
-
CMA. UK Computer Misuse Act 1990, http://www.opsi.gov.uk; 1990.
-
(1990)
-
-
-
9
-
-
77955561375
-
-
CPIA. UK Criminal Procedure and Investigations Act 1996
-
CPIA. UK Criminal Procedure and Investigations Act 1996, http://www.opsi.gov.uk; 1996.
-
(1996)
-
-
-
10
-
-
77955579530
-
-
DPA. UK Data Protection Act 1998
-
DPA. UK Data Protection Act 1998, http://www.opsi.gov.uk; 1998.
-
(1998)
-
-
-
11
-
-
84887666718
-
-
European Network and Information Security Agency
-
ENISA. ENISA cloud computing risk assessment. European Network and Information Security Agency, http://www.enisa. europa.eu; 2010.
-
(2010)
ENISA Cloud Computing Risk Assessment
-
-
-
12
-
-
77955582355
-
-
Eucalyptus. Eucalyptus systems, http://www.eucalyptus.com; 2010.
-
(2010)
Eucalyptus Systems
-
-
-
13
-
-
70349950116
-
-
Google. Google Docs, http://www.google.com/google-d-s/privacy. html; 2010.
-
(2010)
Google Docs
-
-
-
14
-
-
63149159223
-
The case for cloud computing
-
Grossman R. The case for cloud computing. IT Professional 2009; 11(2):23-7.
-
(2009)
IT Professional
, vol.11
, Issue.2
, pp. 23-7
-
-
Grossman, R.1
-
17
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman L. Data security in the world of cloud computing. IEEE Security and Privacy 2009;7(4):61-4.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 61-4
-
-
Kaufman, L.1
-
23
-
-
77955579073
-
Sun open cloud platform
-
Sun. Sun open cloud platform. Sun Microsystems, http://www.sun. com; 2010.
-
(2010)
Sun Microsystems
-
-
-
25
-
-
77955562281
-
Cloud computing: Data protection concerns unwrapped
-
Treacy B. Cloud computing: data protection concerns unwrapped. Privacy and Data Protection 2009;9(3):1-3.
-
(2009)
Privacy and Data Protection
, vol.9
, Issue.3
, pp. 1-3
-
-
Treacy1
-
26
-
-
77955579831
-
Fake websites shut down by police
-
3 Dec
-
Vahl S. Fake websites shut down by police. BBC News, http://news. bbc.co.uk/1/hi/uk/8392600.stm; 3 Dec 2009.
-
(2009)
BBC News
-
-
Vahl, S.1
-
28
-
-
69349098776
-
Cloud computing and the common man
-
Viega J. Cloud computing and the common man. IEEE Computer 2009;42(8):106-8.
-
(2009)
IEEE Computer
, vol.42
, Issue.8
, pp. 106-8
-
-
Viega, J.1
|