-
1
-
-
84864612664
-
-
Amazon Web Services [accessed 28.12.11]
-
Amazon Web Services AWS import/export 2011 Available at: http://aws.amazon.com/importexport/ [accessed 28.12.11]
-
(2011)
AWS Import/export
-
-
-
3
-
-
84864632656
-
Code injection from the hypervisor: Removing the need for in-guest agents
-
[accessed 01.11.11]
-
M. Conover, and T. Chiueh Code injection from the hypervisor: removing the need for in-guest agents Proceedings of Blackhat USA 2008 [accessed 01.11.11]
-
(2008)
Proceedings of Blackhat USA
-
-
Conover, M.1
Chiueh, T.2
-
6
-
-
84864612252
-
Understanding issues in cloud forensics: Two hypothetical case studies
-
J. Dykstra, and A.T. Sherman Understanding issues in cloud forensics: two hypothetical case studies Journal of Network Forensics 3 1 2011 19 31
-
(2011)
Journal of Network Forensics
, vol.3
, Issue.1
, pp. 19-31
-
-
Dykstra, J.1
Sherman, A.T.2
-
7
-
-
84864579108
-
-
Eucalyptus [accessed 01.11.11]
-
Eucalyptus Eucalyptus: the open source cloud platform 2011 Available at: http://open.eucalyptus.com/ [accessed 01.11.11]
-
(2011)
Eucalyptus: The Open Source Cloud Platform
-
-
-
9
-
-
33745997324
-
Forensic feature extraction and cross-drive analysis
-
DOI 10.1016/j.diin.2006.06.007, PII S1742287606000697
-
S. Garfinkel Forensic feature extraction and cross-drive analysis Digital Investigation 3 2006 71 81 (Pubitemid 44066907)
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL.
, pp. 71-81
-
-
Garfinkel, S.L.1
-
12
-
-
84864632653
-
-
[accessed 21.09.11]
-
Guidance Software EnCase Legal Journal 2011 Available at: http://www.guidancesoftware.com/DocumentRegistration.aspx?did=1000017380 [accessed 21.09.11]
-
(2011)
EnCase Legal Journal
-
-
Software, G.1
-
14
-
-
80054727974
-
-
Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland
-
Krautheim FJ. Building trust into utility cloud computing. Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland; 2010.
-
(2010)
Building Trust into Utility Cloud Computing
-
-
Krautheim, F.J.1
-
18
-
-
84864630401
-
-
National Institute of Standards and Technology [accessed 21.09.11]
-
National Institute of Standards and Technology Computer forensic tool testing (CFTT) project overview 2003 Available at: http://www.cftt.nist.gov/ project-overview.htm [accessed 21.09.11]
-
(2003)
Computer Forensic Tool Testing (CFTT) Project Overview
-
-
-
19
-
-
48749114923
-
-
National Institute of Standards and Technology [accessed 21.09.11]
-
National Institute of Standards and Technology Digital data acquisition tool specification 2004 Available at: http://www.cftt.nist.gov/Pub-Draft-1-DDA- Require.pdf [accessed 21.09.11]
-
(2004)
Digital Data Acquisition Tool Specification
-
-
-
20
-
-
84864631928
-
-
Institute Of Standards And Technology N. [accessed 21.09.11]
-
National Institute of Standards and Technology Test results for digital data acquisition tool: FTK imager 2.5.3.14 2008 Available at: http://www.ncjrs.gov/pdffiles1/nij/222982.pdf [accessed 21.09.11]
-
(2008)
Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14
-
-
-
21
-
-
84864632302
-
-
National Institute of Standards and Technology [accessed 21.09.11]
-
National Institute of Standards and Technology Test results for digital data acquisition tool: EnCase 6.5 2009 Available at: http://www.ncjrs.gov/ pdffiles1/nij/228226.pdf [accessed 21.09.11]
-
(2009)
Test Results for Digital Data Acquisition Tool: EnCase 6.5
-
-
-
22
-
-
77954051808
-
-
National Institute of Standards and Technology [accessed 08.01.12]
-
National Institute of Standards and Technology The NIST definition of cloud computing 2011 Available at: http://csrc.nist.gov/publications/nistpubs/ 800-145/SP800-145.pdf [accessed 08.01.12]
-
(2011)
The NIST Definition of Cloud Computing
-
-
-
24
-
-
84864599653
-
-
[accessed 21.09.11]
-
M. Santana Cloud security: beyond the buzz 2009 Available at: http://www.linuxworldexpo.com/storage/10/documents/CI7%20Mario%20Santana.pdf [accessed 21.09.11]
-
(2009)
Cloud Security: Beyond the Buzz
-
-
Santana, M.1
-
25
-
-
84929445167
-
Towards trusted cloud computing
-
[accessed 19.05.12]
-
N. Santos, K. Gummadi, and R. Rodrigues Towards trusted cloud computing Proceedings of USENIX HotCloud 2009 Available at: http://static.usenix.org/ events/hotcloud09/tech/full-papers/santos.pdf [accessed 19.05.12]
-
(2009)
Proceedings of USENIX HotCloud
-
-
Santos, N.1
Gummadi, K.2
Rodrigues, R.3
-
27
-
-
84864632657
-
Best computer forensic tool
-
Scmagazine [accessed 01.11.11]
-
SCMagazine Best computer forensic tool SCMagazine 2011 [accessed 01.11.11]
-
(2011)
SCMagazine
-
-
-
28
-
-
84864582590
-
A system for the proactive, continuous, and efficient collection of digital forensic evidence
-
C. Shields, O. Frieder, and M. Maloo A system for the proactive, continuous, and efficient collection of digital forensic evidence The proceedings of the eleventh annual DFRWS conference vol. 8 2011 S3 13
-
(2011)
The Proceedings of the Eleventh Annual DFRWS Conference
, vol.8
, pp. 3-13
-
-
Shields, C.1
Frieder, O.2
Maloo, M.3
-
29
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
M. Taylor, J. Haggerty, D. Gresty, and D. Lamb Forensic investigation of cloud computing systems Network Security 2011 3 2011 4 10
-
(2011)
Network Security
, vol.2011
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
30
-
-
84864632658
-
-
Terremark [accessed 01.11.11]
-
Terremark Secure information services 2009 Available at: http://www.terremark.com/uploadedFiles/Services/Security-Services/TMRK- SIS-Gatefold2-4pagelayout-Screen.pdf [accessed 01.11.11]
-
(2009)
Secure Information Services
-
-
|