-
1
-
-
79960705729
-
Digital Forensic Research: The Good, the Bad and the Unaddressed
-
N. Beebe, Digital Forensic Research: The Good, the Bad and the Unaddressed, Advances in Digital Forensics V, 2009
-
(2009)
Advances in Digital Forensics
, vol.5
-
-
Beebe, N.1
-
6
-
-
0036870198
-
Network Forensics Analysis
-
V. Corey, C. Peterman, S. Shearin, M.S. Greenberg and J. Van Bokkelen, Network Forensics Analysis, IEEE Internet Computing Journal, 2002
-
(2002)
IEEE Internet Computing Journal
-
-
Corey, V.1
Peterman, C.2
Shearin, S.3
Greenberg, M.S.4
Van Bokkelen, J.5
-
7
-
-
61349188280
-
Forensic Analysis of the Firefox 3 Internet History and Recovery of Deleted SQLite Records
-
M. Pereira, Forensic Analysis of the Firefox 3 Internet History and Recovery of Deleted SQLite Records, Digital Investigation Journal, 2009
-
(2009)
Digital Investigation Journal
-
-
Pereira, M.1
-
8
-
-
77954472312
-
Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing
-
L. Rongxing, L. Xiaodong, L. Xiaohui and S. Sherman, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10), 2010
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10), 2010
-
-
Rongxing, L.1
Xiaodong, L.2
Xiaohui, L.3
Sherman, S.4
-
9
-
-
70349309706
-
Data Security in the World of Cloud Computing
-
IEEE Educational Activities Department
-
L. Kaufman, Data Security in the World of Cloud Computing, IEEE Security and Privacy Journal, IEEE Educational Activities Department, 2009
-
(2009)
IEEE Security and Privacy Journal
-
-
Kaufman, L.1
-
11
-
-
85013926397
-
-
Syngress
-
A. Reyes, R. Brittson, K. O'Shea and J. Steele, Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors, Syngress, 2007
-
(2007)
Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors
-
-
Reyes, A.1
Brittson, R.2
O'Shea, K.3
Steele, J.4
-
12
-
-
74049152260
-
Hey, You, Get off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham and S. Savage, Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), 2009
-
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
13
-
-
84868569834
-
FACE: Automated Digital Evidence Discovery and Correlation
-
A. Case, A. Cristina, L. Marziale, G. Richard and V. Roussev, FACE: Automated Digital Evidence Discovery and Correlation, in Proceedings of the Eighth Annual DFRWS Conference, 2008
-
(2008)
Proceedings of the Eighth Annual DFRWS Conference
-
-
Case, A.1
Cristina, A.2
Marziale, L.3
Richard, G.4
Roussev, V.5
-
19
-
-
84882750204
-
An Analysis of Private Browsing Modes in Modern Browsers
-
G. Aggrawal, E. Bursztein, C. Jackson and D. Boneh, An Analysis of Private Browsing Modes in Modern Browsers, in Proceedings of 19th Usenix Security Symposium, 2010
-
Proceedings of 19th Usenix Security Symposium, 2010
-
-
Aggrawal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
20
-
-
79960715992
-
Virtual Machine for Computer Forensics - The Open Source Perspective
-
Springer
-
D. Bem Virtual Machine for Computer Forensics - the Open Source Perspective, Open Source Software for Digital Forensics, Springer, 2010
-
(2010)
Open Source Software for Digital Forensics
-
-
Bem, D.1
-
22
-
-
84858731161
-
-
Forensics Web Services (FWS)
-
A. Singhal, M. Gunestas, A. Singhal, D. Wijesekara and D. Gallagher, Forensics Web Services (FWS), NIST Interagency Report Draft, 2010
-
(2010)
NIST Interagency Report Draft
-
-
Singhal, A.1
Gunestas, M.2
Singhal, A.3
Wijesekara, D.4
Gallagher, D.5
-
25
-
-
54049127315
-
Forensics Examination of Volatile System Data using Virtual Introspection
-
B. Hay and K. Nance, Forensics Examination of Volatile System Data using Virtual Introspection, ACM SIGOPS Operating Systems Review, 2008
-
(2008)
ACM SIGOPS Operating Systems Review
-
-
Hay, B.1
Nance, K.2
-
26
-
-
70349750047
-
The Eucalyptus Open-Source Cloud-Computing System
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff and D. Zagorodnov, The Eucalyptus Open-Source Cloud-Computing System, in Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), 2009
-
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), 2009
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
30
-
-
70350389843
-
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
-
LNCS Springer
-
Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Information Systems Security, LNCS Springer, 2008
-
(2008)
Information Systems Security
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
31
-
-
85018107502
-
Vanish: Increasing Data Privacy with Self-Destructing Data
-
R. Geambasu, T. Kohno, A. Levy and H. Levy, Vanish: Increasing Data Privacy with Self-Destructing Data, in Proceedings of the 18th Conference on USENIX Security Symposium, 2009
-
Proceedings of the 18th Conference on USENIX Security Symposium, 2009
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.4
-
32
-
-
74049093526
-
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control
-
R. Chow, P. Golle, M. Jakobsson, R. Shi, J. Staddon, R. Masuoka, and J. Molina, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, in Proceedings of the 2009 ACM Cloud Computing Security Workshop (CCSW '09), 2009
-
Proceedings of the 2009 ACM Cloud Computing Security Workshop (CCSW '09), 2009
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, R.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
35
-
-
80052008862
-
HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
-
to be published at
-
Y. Zhang, A. Juels, A. Oprea and M. Reiter, HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis, to be published at Security and Privacy IEEE Symposium, 2011
-
Security and Privacy IEEE Symposium, 2011
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.4
-
37
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. and Song, Provable Data Possession at Untrusted Stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), 2007
-
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), 2007
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
42
-
-
84858731166
-
-
Payment Card Industry Data Security Standard (PCI DSS), https://www.pcisecuritystandards.org/security-standards/index.php
-
-
-
|