-
4
-
-
85028466658
-
-
Hadoop - mapreduce (2011), http://hadoop.apache.org/mapreduce
-
(2011)
Mapreduce
-
-
-
9
-
-
79960257802
-
Cryptography Goes to the Cloud
-
Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. Springer, Heidelberg
-
Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., Lambrinoudakis, C.: Cryptography Goes to the Cloud. In: Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. CCIS, vol. 187, pp. 190-197. Springer, Heidelberg (2011)
-
(2011)
CCIS
, vol.187
, pp. 190-197
-
-
Agudo, I.1
Nuñez, D.2
Giammatteo, G.3
Rizomiliotis, P.4
Lambrinoudakis, C.5
-
10
-
-
38149024127
-
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
-
Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
-
Ando, R., Kadobayashi, Y., Shinoda, Y.: Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 131-143. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 131-143
-
-
Ando, R.1
Kadobayashi, Y.2
Shinoda, Y.3
-
11
-
-
85019514248
-
Green cloud computing: Balancing energy in processing, storage, and transport
-
Baliga, J., Ayre, R.W.A., Hinton, K., Tucker, R.S.: Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE 99(1), 149-167 (2011)
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.1
, pp. 149-167
-
-
Baliga, J.1
Ayre, R.W.A.2
Hinton, K.3
Tucker, R.S.4
-
12
-
-
85013744824
-
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
-
Syngress/Elsevier
-
Barrett, D., Kipper, G.: Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. Syngress Media, Syngress/Elsevier (2010), http://books.google.at/books?id=QXF1kKX2za8C
-
(2010)
Syngress Media
-
-
Barrett, D.1
Kipper, G.2
-
13
-
-
84943526145
-
Digital forensic research: The good, the bad and the unaddressed
-
Peterson, G., Shenoi, S. (eds.) Springer, Boston
-
Beebe, N., Beebe, N.: Digital forensic research: The good, the bad and the unaddressed. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. IFIP AICT, vol. 306, pp. 17-36. Springer, Boston (2009)
-
(2009)
Advances in Digital Forensics V. IFIP AICT
, vol.306
, pp. 17-36
-
-
Beebe, N.1
Beebe, N.2
-
15
-
-
84865625452
-
Technical challenges of forensic investigations in cloud computing environments
-
March
-
Birk, D.: Technical challenges of forensic investigations in cloud computing environments. In: Proceedings of the Workshop on Cryptography and Security in Clouds, pp. 1-6 (March 2011)
-
(2011)
Proceedings of the Workshop on Cryptography and Security in Clouds
, pp. 1-6
-
-
Birk, D.1
-
16
-
-
84858712240
-
Technical issues of forensic investigations in cloud computing environments
-
Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA (2011)
-
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA (2011)
-
-
Birk, D.1
Wegener, C.2
-
17
-
-
77950555514
-
Guidelines for evidence collection and archiving
-
Best Current Practice
-
Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. RFC 3227 (Best Current Practice) (2002)
-
(2002)
RFC
, vol.3227
-
-
Brezinski, D.1
Killalea, T.2
-
21
-
-
74049093526
-
Controlling data in the cloud:outsourcing computation without outsourcing control
-
ACM November
-
Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J.: Controlling data in the cloud:outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85-90. ACM (November 2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009)
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Masuoka, R.4
Molina, J.5
-
23
-
-
79961049729
-
Distributed forensics and incident response in the enterprise
-
Cohen, M., Bilby, D., Caronni, G.: Distributed forensics and incident response in the enterprise. Digital Investigation 8(suppl.), S101-S110 (2011)
-
(2011)
Digital Investigation
, vol.8
, Issue.SUPPL.
-
-
Cohen, M.1
Bilby, D.2
Caronni, G.3
-
26
-
-
77954322780
-
Cloud computing: Issues and challenges
-
Dillon, T.S., Wu, C., Chang, E.: Cloud computing: Issues and challenges. In: Proceedings of the International Conference on Advanced Information Networking and Applications (AINA 2010), pp. 27-33 (2010)
-
(2010)
Proceedings of the International Conference on Advanced Information Networking and Applications (AINA 2010)
, pp. 27-33
-
-
Dillon, T.S.1
Wu, C.2
Chang, E.3
-
27
-
-
82455199242
-
Storage and exchange formats for digital evidence
-
standards, professionalization and quality in digital forensics
-
Flaglien, A.O., Mallasvik, A., Mustorp, M., Arnes, A.: Storage and exchange formats for digital evidence. Digital Investigation 8(2), 122-128 (2011); standards, professionalization and quality in digital forensics
-
(2011)
Digital Investigation
, vol.8
, Issue.2
, pp. 122-128
-
-
Flaglien, A.O.1
Mallasvik, A.2
Mustorp, M.3
Arnes, A.4
-
28
-
-
62949225623
-
Cloud computing and grid computing 360- Degree compared
-
Foster, I.T., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360- degree compared. Computing Research Repository abs/0901.0131, 1-10 (2009)
-
(2009)
Computing Research Repository Abs/0901.0131
, pp. 1-10
-
-
Foster, I.T.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
29
-
-
77955374828
-
Digital forensics research: The next 10 years
-
the Proceedings of the Tenth Annual DFRWS Conference
-
Garfinkel, S.L.: Digital forensics research: The next 10 years. Digital Investigation 7(suppl. 1), S64-S73 (2010); the Proceedings of the Tenth Annual DFRWS Conference
-
(2010)
Digital Investigation
, vol.7
, Issue.SUPPL. 1
-
-
Garfinkel, S.L.1
-
32
-
-
84865623152
-
-
August draft published for comment
-
Grispos, G., Glisson, W.B., Storer, T.: Calm before the storm: The emerging challenges of cloud computing in digital forensics (August 2011), http://www.dcs.gla.ac.uk/~tws/papers/grispos11calm-rev2425.pdf, draft published for comment
-
(2011)
Calm before the Storm: The Emerging Challenges of Cloud Computing in Digital Forensics
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
33
-
-
84920116565
-
-
June
-
Hegarty, R., Merabti, M., Shi, Q., Askwith, B.: Forensic analysis of distributed service oriented computing platforms (June 2011)
-
(2011)
Forensic Analysis of Distributed Service Oriented Computing Platforms
-
-
Hegarty, R.1
Merabti, M.2
Shi, Q.3
Askwith, B.4
-
34
-
-
36448941716
-
-
recommendations of the National Institute of Standards and Technology
-
Karen, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response, recommendations of the National Institute of Standards and Technology (2006)
-
(2006)
Guide to Integrating Forensic Techniques into Incident Response
-
-
Karen, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
35
-
-
84865623158
-
-
December accessed: December 30, 2011
-
Kazarian, B., Hanlon, B.: SMB Cloud Adoption Study,- Global Report (December 2010), http://www.microsoft.com/Presspass/presskits/commsector/docs/ SMBStudy 032011.pdf (accessed: December 30, 2011)
-
(2010)
SMB Cloud Adoption Study,- Global Report
-
-
Kazarian, B.1
Hanlon, B.2
-
37
-
-
32044466453
-
Hyperspector: Virtual distributed monitoring environments for secure intrusion detection
-
Hind, M., Vitek, J. (eds.) ACM
-
Kourai, K., Chiba, S.: Hyperspector: virtual distributed monitoring environments for secure intrusion detection. In: Hind, M., Vitek, J. (eds.) Proceedings of the 1st International Conference on Virtual Execution Environments (VEE 2005), pp. 197-207. ACM (2005)
-
(2005)
Proceedings of the 1st International Conference on Virtual Execution Environments (VEE 2005)
, pp. 197-207
-
-
Kourai, K.1
Chiba, S.2
-
38
-
-
78650023378
-
Trail of bytes: Efficient support for forensic analysis
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
-
Krishnan, S., Snow, K.Z., Monrose, F.: Trail of bytes: efficient support for forensic analysis. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) Proceedings of ACM Conference on Computer and Communications Security (ACM CCS 2010), pp. 50-60. ACM (2010)
-
(2010)
Proceedings of ACM Conference on Computer and Communications Security (ACM CCS 2010)
, pp. 50-60
-
-
Krishnan, S.1
Snow, K.Z.2
Monrose, F.3
-
40
-
-
84865623156
-
-
Tech. rep., Dartmouth College, Hanover, New Hampshire
-
Kuhn, S., Taylor, S.: A survey of forensic analysis in virtualized environments. Tech. rep., Dartmouth College, Hanover, New Hampshire (2011)
-
(2011)
A Survey of Forensic Analysis in Virtualized Environments
-
-
Kuhn, S.1
Taylor, S.2
-
41
-
-
84865645084
-
-
online; Status: January 09, 2012
-
Sandia National Laboratories: Libvmi (2011), http://vmitools.sandia.gov/ libvmi.html (online; Status: January 09, 2012)
-
(2011)
Libvmi
-
-
-
43
-
-
85013982702
-
-
Elsevier
-
Lillard, T., Garrison, C., Schiller, C., Steele, J., Murray, J.: Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data. Elsevier (2010), http://books.google.at/books?id= A4V45b2w27gC
-
(2010)
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
-
-
Lillard, T.1
Garrison, C.2
Schiller, C.3
Steele, J.4
Murray, J.5
-
44
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
Feng, D., Basin, D.A., Liu, P. (eds.) ACM
-
Lu, R., Lin, X., Liang, X., Shen, X.S.: Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Feng, D., Basin, D.A., Liu, P. (eds.) Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pp. 282-292. ACM (2010)
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010)
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.S.4
-
45
-
-
60649097606
-
-
Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, Purdue University
-
Marsico, C.V.: Computer evidence v. daubert: The coming conflict. Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, Purdue University (2005)
-
(2005)
Computer Evidence V. Daubert: The Coming Conflict
-
-
Marsico, C.V.1
-
46
-
-
79959322079
-
Cloud application logging for forensics
-
Chu, W.C., Wong, W.E., Palakal, M.J., Hung, C.C. (eds.) ACM
-
Marty, R.: Cloud application logging for forensics. In: Chu, W.C., Wong, W.E., Palakal, M.J., Hung, C.C. (eds.) Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), pp. 178-184. ACM (2011)
-
(2011)
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC)
, pp. 178-184
-
-
Marty, R.1
-
47
-
-
80053048376
-
Digital evidence and "cloud" computing
-
Mason, S., George, E.: Digital evidence and "cloud" computing. Computer Law & Security Review 27(5), 524-528 (2011)
-
(2011)
Computer Law & Security Review
, vol.27
, Issue.5
, pp. 524-528
-
-
Mason, S.1
George, E.2
-
53
-
-
79951489100
-
Cloud computing: Forensic challenges for law enforcement
-
IEEE
-
Reilly, D., Wren, C., Berry, T.: Cloud computing: Forensic challenges for law enforcement. In: Proceedings of International Conference for Internet Technology and Secured Transactions ICITST 2010, pp. 1-7. IEEE (2010)
-
(2010)
Proceedings of International Conference for Internet Technology and Secured Transactions ICITST 2010
, pp. 1-7
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
54
-
-
33745203008
-
Next-generation digital forensics
-
Richard, G.G., Roussev, V.: Next-generation digital forensics. Communications of the ACM 49, 76-80 (2006), http://doi.acm.org/10.1145/1113034. 1113074
-
(2006)
Communications of the ACM
, vol.49
, pp. 76-80
-
-
Richard, G.G.1
Roussev, V.2
-
56
-
-
84865644048
-
Mmr: A platform for large-scale forensic computing
-
Roussev, V.,Wang, L., Richard, G.G., Marziale, L.: Mmr: A platform for large-scale forensic computing. In: Proceedings of the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics (2009)
-
Proceedings of the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics (2009)
-
-
Roussev, V.1
Wang, L.2
Richard, G.G.3
Marziale, L.4
-
57
-
-
84870748627
-
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
-
Ruan, K., Baggili, I., Carthy, J., Kechadi, T.: Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In: Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law (2011)
-
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law (2011)
-
-
Ruan, K.1
Baggili, I.2
Carthy, J.3
Kechadi, T.4
-
58
-
-
84865637456
-
Cloud forensics: An overview
-
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35-49 (2011)
-
(2011)
Advances in Digital Forensics
, vol.7
, pp. 35-49
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
61
-
-
77955574175
-
Digital evidence in cloud computing systems
-
Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Computer Law & Security Review 26(3), 304-308 (2010)
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
62
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
Taylor, M., Haggerty, J., Gresty, D., Lamb, D.: Forensic investigation of cloud computing systems. Network Security 2011(3), 4-10 (2011)
-
(2011)
Network Security
, vol.2011
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
63
-
-
78651078141
-
Using a local search warrant to acquire evidence stored overseas via the internet
-
Chow, K.P., Shenoi, S. (eds.) Springer, Boston
-
Wang, K.: Using a local search warrant to acquire evidence stored overseas via the internet. In: Chow, K.P., Shenoi, S. (eds.) Advances in Digital Forensics VI. IFIP AICT, vol. 337, pp. 37-48. Springer, Boston (2010), http://dx.doi.org/10.1007/978-3-642-15506-2-3
-
(2010)
Advances in Digital Forensics VI. IFIP AICT
, vol.337
, pp. 37-48
-
-
Wang, K.1
-
64
-
-
84979802564
-
Foundations of computer forensics: A technology for the fight against computer crime
-
Wang, Y., Cannady, J., Rosenbluth, J.: Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Review 21(2), 119-127 (2005)
-
(2005)
Computer Law & Security Review
, vol.21
, Issue.2
, pp. 119-127
-
-
Wang, Y.1
Cannady, J.2
Rosenbluth, J.3
-
66
-
-
84865644049
-
-
Zimmerman, S., Glavach, D.: Cyber forensics in the cloud, the newsletter for information assurance technology professionals volume 14(1) (2011), http://iac.dtic.mil/iatac
-
(2011)
Cyber Forensics in the Cloud, the Newsletter for Information Assurance Technology Professionals
, vol.14
, Issue.1
-
-
Zimmerman, S.1
Glavach, D.2
|