메뉴 건너뛰기




Volumn , Issue , 2012, Pages 194-199

Cloud log forensics metadata analysis

Author keywords

Cloud; Forensics; Hypervisor; Logs; Metadata

Indexed keywords

CRIMINAL ACTIVITIES; DATA CLOUDS; FORENSIC INFORMATION; FORENSICS; HYPERVISOR; LOGS; METADATA ANALYSIS; ON CURRENTS; VIRTUAL MACHINES;

EID: 84870803956     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSACW.2012.44     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 3
    • 33947702316 scopus 로고    scopus 로고
    • Pervasive binding of labels to system processes
    • August Retrieved from
    • Florian Buchholz . Pervasive binding of labels to system processes. In Proceedings of the published Phd thesis, August 2005. Retrieved from https://users.cs.jmu.edu/buchhofp/publications/buchholz-thesis.pdf2.
    • (2005) Proceedings of the Published Phd Thesis
    • Buchholz, F.1
  • 4
    • 10644285176 scopus 로고    scopus 로고
    • Providing process origin information to aid in computer forensic investigations
    • September
    • Florian Buchholz and Clay Shields. Providing process origin information to aid in computer forensic investigations. Journal of Computer Security, 12(5):753-776, September 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.5 , pp. 753-776
    • Buchholz, F.1    Shields, C.2
  • 7
    • 0036351977 scopus 로고    scopus 로고
    • A recursive session token protocol for use in computer forensicsand TCP traceback
    • June
    • B. Carrier and C. Shields. A recursive session token protocol for use in computer forensicsand TCP traceback. In Proceedings of the IEEE Infocomm 2002, June 2002.
    • (2002) Proceedings of the IEEE Infocomm 2002
    • Carrier, B.1    Shields, C.2
  • 9
    • 7544240929 scopus 로고    scopus 로고
    • Defining event reconstruction of digital crime scenes
    • CERIAS TR 2004-37.13
    • Brian D. Carrier and Eugene H. Spafford. Defining event reconstruction of digital crime scenes. Journal of Forensic Sciences, 49(6), 11 2004. CERIAS TR 2004-37.13
    • (2004) Journal of Forensic Sciences , vol.49 , Issue.6 , pp. 11
    • Carrier, B.D.1    Spafford, E.H.2
  • 14
    • 0013393580 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • ACM Press/Addison-Wesley Publishing Co.
    • Dorothy E. Denning and Peter F. Mac Doran. Location-based authentication: grounding cyberspace for better security. In Internet besieged: countering cyberspace scofflaws, pages 167-174. ACM Press/Addison-Wesley Publishing Co., 1998.
    • (1998) Internet Besieged: Countering Cyberspace Scofflaws , pp. 167-174
    • Denning, D.E.1    Mac Doran, P.F.2
  • 15
    • 84870852455 scopus 로고    scopus 로고
    • Encase forensic software, http://www.guidancesoftware.com.
  • 18
    • 84870770196 scopus 로고    scopus 로고
    • [ The forensic toolkit. http://www.accessdata.com/Product04-Overview.htm.
    • The Forensic Toolkit
  • 20
    • 84865629721 scopus 로고    scopus 로고
    • File timestamps in a cloud digital investigation
    • ISSN 1554-1010 Volume 6 March
    • Sean Thorpe, Indrajit Ray. File timestamps in a cloud digital investigation. Journal of Information Assurance and Security. ISSN 1554-1010 Volume 6 (March 2011) pp. 495-502
    • (2011) Journal of Information Assurance and Security , pp. 495-502
    • Thorpe, S.1    Ray, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.