-
1
-
-
79951496742
-
Mobile phones - The new fingerprints
-
18 December
-
C. Summers, Mobile phones - the new fingerprints, BBC News Online, http://news.bbc.co.uk/1/hi/uk/3303637.stm 18 December 2003.
-
(2003)
BBC News Online
-
-
Summers, C.1
-
2
-
-
79951472433
-
Cell phone forensics
-
January
-
M. Amorebieta, Cell phone forensics, Inside Dateline on msnbc.com, http://insidedateline.msnbc.msn.com/-news/2007/01/23/43 74177-cellphone- forensics January 2007.
-
(2007)
Inside Dateline on msnbc.com
-
-
Amorebieta, M.1
-
3
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ISBN: 978-1-60558-784-4
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009, ISBN: 978-1-60558-784-4.
-
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
4
-
-
77950347409
-
A view of cloud computing
-
ISSN: 0001-0782
-
M. Armbrust, A. Fox, R, Griffith, A. Joseph, R. Katz, A. Konwinski, G. Leee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, A view of cloud computing, Communications of the ACM, vol. 53(4), 2010, ISSN: 0001-0782.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Leee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility
-
Elsevier Science Publishers, ISSN: 0167-739X
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype and reality for delivering computing as the 5th utility, Future Generation Computer Systems, Vol. 25(6), Elsevier Science Publishers, 2009, ISSN: 0167-739X.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
6
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
I. Foster, Y. Zhao, I. Raicu, S. Lu, Cloud computing and grid computing 360-degree compared," Proc. Grid Computing Environments (GCE08), 2008, pp. 1-10.
-
Proc. Grid Computing Environments (GCE08), 2008
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
7
-
-
84856090651
-
-
Computer Security Division, Computer Security Resource Center, May
-
NIST, Definition of cloud computing v15, Computer Security Division, Computer Security Resource Center, http://csrc.nist.gov/groups/SNS/cloud- computingi May 2010.
-
(2010)
Definition of Cloud Computing V15
-
-
-
9
-
-
77957936026
-
-
June
-
Google App Engine, http://code.google.com/appengine/ June 2010.
-
(2010)
Google App Engine
-
-
-
10
-
-
1942425715
-
-
Artech House, Boston, ISBN 1-58053-369-8
-
G. Mohay, A. Anderson, B. Collie, O. De Vel, R. McKemmish, Computer and intrusion forensics, Artech House, Boston, ISBN 1-58053-369-8, 2003.
-
(2003)
Computer and Intrusion Forensics
-
-
Mohay, G.1
Anderson, A.2
Collie, B.3
De Vel, O.4
McKemmish, R.5
-
11
-
-
0348155988
-
Forensic computing
-
Springer, ISBN: 978-3-540-20609-5
-
X. Li, J. Seberry, Forensic computing, Lecture Notes in Computer Science, Springer, vol. 2904/2003, ISBN: 978-3-540-20609-5, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2904
, Issue.2003
-
-
Li, X.1
Seberry, J.2
-
17
-
-
1242273312
-
An examination of digital forensic models
-
M. Reith, C. Carr, G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002.
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.3
-
-
Reith, M.1
Carr, C.2
Gunsch, G.3
-
19
-
-
79951474270
-
-
Institute for Communications, Arbitration and Forensics, April
-
Institute for Communications, Arbitration and Forensics, Mobile phone security solutions http://www.securitytechnologynews.com/article/mobile-phone- security-solutions.html April 2010.
-
(2010)
Mobile Phone Security Solutions
-
-
-
20
-
-
84858613793
-
-
June
-
Wikipedia, http://en.wikipedia.org/wiki/Virtualization June 2010
-
(2010)
Wikipedia
-
-
-
21
-
-
79951488150
-
-
June
-
VMWare, http://www.vmware.com/June 2010
-
(2010)
-
-
-
22
-
-
79951482734
-
-
June
-
Citrix XenServer, http://www.citrix.com June 2010.
-
(2010)
Citrix XenServer
-
-
-
24
-
-
54049127315
-
Forensic examination of volatile system data using virtual introspection
-
ISSN: 0163-5980 April
-
B. Hay, K. Nance, Forensic examination of volatile system data using virtual introspection, ACM SIGOPS Operating Systems Review, vol. 42(3) ISSN: 0163-5980 April 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.3
-
-
Hay, B.1
Nance, K.2
-
25
-
-
79951476906
-
VMWare as a forensic tool
-
May
-
B. Shavers, VMWare as a forensic tool, Forensic Focus, http://www.forensicfocus.com/vmware-forensic-tool, May 2006.
-
(2006)
Forensic Focus
-
-
Shavers, B.1
-
26
-
-
39249085953
-
Commodity grid computing with Amazon's S3 and EC2, login
-
February
-
S. Garfinkel, Commodity grid computing with Amazon's S3 and EC2, login, USENIX, vol. 32(1), February 2007, pp7-13.
-
(2007)
USENIX
, vol.32
, Issue.1
, pp. 7-13
-
-
Garfinkel, S.1
|