-
5
-
-
84870748800
-
-
online
-
Bursztein E., Fontarensky I., Martin M., and Picod J.,"Doing Forensics in the Cloud Age OWADE: Beyond Files Recovery Forensic", 2011, online 〈http://cdn.ly.tl/talks/owadepaper.pdf〉
-
(2011)
Doing Forensics in the Cloud Age OWADE: Beyond Files Recovery Forensic
-
-
Bursztein, E.1
Fontarensky, I.2
Martin, M.3
Picod, J.4
-
6
-
-
84870754853
-
Cloud Computing a Forensics Immature Technology
-
July online available
-
Carmenatty E., "Cloud Computing a Forensics Immature Technology", A Unit of Knowledge (KNOL), July 2010, online available 〈http://knol.google.com/k/cloud-computing-a-forensics-inmature- technology#〉
-
(2010)
A Unit of Knowledge (KNOL)
-
-
Carmenatty, E.1
-
9
-
-
84890845543
-
-
Information and Computer Security Architectures Research Group, Dept. of Computer Science, University of Pretoria, South Africa, August
-
Delport W., Olivier M., and Kohn M, "Isolating a Cloud for a Digital Forensic Investigation", Information and Computer Security Architectures Research Group, Dept. of Computer Science, University of Pretoria, South Africa, August 2011
-
(2011)
Isolating A Cloud for A Digital Forensic Investigation
-
-
Delport, W.1
Olivier, M.2
Kohn, M.3
-
10
-
-
84870730574
-
-
Senior Digital Forensic Investigator, QinetiQ
-
Emma Webb Hobson, "Cloud Forensics-Lab Systems' Solutions", Senior Digital Forensic Investigator, QinetiQ, 2010 〈http://www.labsystems. co.in/images/Cloud-Forensics---A-Lab-systems-approach.pdf〉
-
(2010)
Cloud Forensics-Lab Systems' Solutions
-
-
Hobson, E.W.1
-
12
-
-
84937422238
-
10 Security Concerns for Cloud Computing
-
Online available
-
Gregg Michael, "10 Security Concerns for Cloud Computing", Expert Reference Series of White Papers, Online available 〈http://www. globalknowledge.ae/PDF/WP-VI-10SecurityConcernsCloudComputing.pdf〉
-
Expert Reference Series of White Papers
-
-
Michael, G.1
-
13
-
-
80052184968
-
-
IEEE press
-
Houmansadr A., Zonouz S., and Berthier R., "A Cloud-Based Intrusion Detection and Response System for Mobile Phones", IEEE press, pp. 31-32, 2011
-
(2011)
A Cloud-Based Intrusion Detection and Response System for Mobile Phones
, pp. 31-32
-
-
Houmansadr, A.1
Zonouz, S.2
Berthier, R.3
-
14
-
-
82255167186
-
Cloud Computing Security
-
Online available
-
Jamil D., Zaki H., "Cloud Computing Security", Int. Journal of Eng. Sc. and Tech (IJEST), vol. 3, pp. 3478-3483, 2011 Online available 〈http://www.ijest.info/docs/IJEST11-03-04-129.pdf〉
-
(2011)
Int. Journal of Eng. Sc. and Tech (IJEST)
, vol.3
, pp. 3478-3483
-
-
Jamil, D.1
Zaki, H.2
-
16
-
-
84862928639
-
-
Electronics and Telecommunications Research Institute (ETRI), IEEE press
-
Lee J., Hong D., "Pervasive Forensic Analysis based on Mobile Cloud Computing", Electronics and Telecommunications Research Institute (ETRI), IEEE press, pp.572-576, 2011
-
(2011)
Pervasive Forensic Analysis Based on Mobile Cloud Computing
, pp. 572-576
-
-
Lee, J.1
Hong, D.2
-
17
-
-
77954472312
-
Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing
-
[Online] available
-
th ACM (ASIACCS)'10, pp. 282-292, 2010, [Online] available 〈http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf〉
-
(2010)
th ACM (ASIACCS)'10
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shem, X.4
-
18
-
-
84870741145
-
-
IEEE Press, online available
-
Marty Raffael, "Cloud Application Logging for Forensics", IEEE Press, 2011, online available 〈 http://loggly.com/assets/ 4de13091dabe9d0c7800005f/applicationlogging.pdf〉
-
(2011)
Cloud Application Logging for Forensics
-
-
Raffael, M.1
-
19
-
-
84861307113
-
The NIST Definition of Cloud Computing
-
NIST, U.S Department of Commerce
-
Mell P., Grance T., "The NIST Definition of Cloud Computing", NIST Special Publication 800-145, NIST, U.S Department of Commerce,2009
-
(2009)
NIST Special Publication 800-145
-
-
Mell, P.1
Grance, T.2
-
21
-
-
77956353411
-
Cloud Computing Security Issues and Challenges
-
IEEE Press
-
Popovic K., Hocenski Z., "Cloud Computing Security Issues and Challenges", IEEE Press, MIPRO 2010, Opatija, Croatia, pp. 345-349, 2010
-
(2010)
MIPRO 2010, Opatija, Croatia
, pp. 345-349
-
-
Popovic, K.1
Hocenski, Z.2
-
22
-
-
79951489100
-
Cloud Computing: Forensic Challenges for Law Enforcement
-
IEEE Press, London
-
Reilly D., Wren C., Berry T., "Cloud Computing: Forensic Challenges for Law Enforcement", Internet Technology and Secured Transactions (ICITST), IEEE Press, London, 2010
-
(2010)
Internet Technology and Secured Transactions (ICITST)
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
23
-
-
84861524716
-
-
Centre for Cybercrime Investigation, University College Dublin, online available
-
Ruan K., Carthy J., Kechadi T., Crosbie M., "Cloud forensics: An Overview", Centre for Cybercrime Investigation, University College Dublin, 2011, online available 〈http://cloudforensicsresearch.org/publication/ Cloud-Forensics-An-Overview-7th-IFIP.pdf〉
-
(2011)
Cloud Forensics: An Overview
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
24
-
-
84870748627
-
-
University College Dublin, Zayed University, Online available
-
Ruan K., Baggili I., Carthy J., Kechadi T., "Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary analysis", University College Dublin, Zayed University, 2011, Online available 〈http://www.cloudforensicsresearch.org/publication/Survey-on- Cloud-Forensics-and-Critical-Criteria-for-Cloud-Forensic-Capability-6th-ADFSL. pdf〉
-
(2011)
Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis
-
-
Ruan, K.1
Baggili, I.2
Carthy, J.3
Kechadi, T.4
|