-
1
-
-
33748570319
-
On the relationship of privacy and secure remote logging in dynamic systems
-
Springer US
-
R. Accorsi. On the relationship of privacy and secure remote logging in dynamic systems. In Security and Privacy in Dynamic Environments, volume 201, pages 329-339. Springer US, 2006.
-
(2006)
Security and Privacy in Dynamic Environments
, vol.201
, pp. 329-339
-
-
Accorsi, R.1
-
2
-
-
84877971059
-
-
Accessed July 5th, 2012
-
Amazon. Zeus botnet controller. http://aws.amazon.com/security/security- bulletins/zeus-botnet-controller/. [Accessed July 5th, 2012].
-
Zeus Botnet Controller
-
-
-
3
-
-
84870752574
-
-
Accessed July 5th, 2012
-
AWS. Amazon web services. http://aws.amazon.com. [Accessed July 5th, 2012].
-
Amazon Web Services
-
-
-
4
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Springer
-
J. Benaloh and M. De Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in CryptologyâǍ EUROCRYPTâǍŹ93, pages 274-285. Springer, 1994.
-
(1994)
Advances in CryptologyâǍEUROCRYPTâǍŹ93
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
8
-
-
84878003506
-
-
Accessed July 5th, 2012
-
Clavister. Security in the cloud. http://www.clavister.com/documents/ resources/white-papers/clavister-whp-security-in-the-cloud-gb.pdf. [Accessed July 5th, 2012].
-
Security in the Cloud
-
-
-
9
-
-
84877940106
-
-
Congress of the United States. Accessed July 5th, 2012
-
Congress of the United States. Sarbanes-Oxley Act. http://thomas.loc.gov, 2002. [Accessed July 5th, 2012].
-
(2002)
Sarbanes-Oxley Act
-
-
-
10
-
-
84881036300
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
-
J. Dykstra and A. Sherman. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. DoD Cyber Crime Conference, January 2012.
-
DoD Cyber Crime Conference, January 2012
-
-
Dykstra, J.1
Sherman, A.2
-
11
-
-
84877958375
-
-
FBI. 2008 Regional Computer Forensics Laboratory Program, Accessed July 5th, 2012
-
FBI. Annualreport for fiscal year 2007. 2008 Regional Computer Forensics Laboratory Program, 2008. [Accessed July 5th, 2012].
-
(2008)
Annualreport for Fiscal Year 2007
-
-
-
13
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
M. Goodrich, R. Tamassia, and J. Hasić. An efficient dynamic and distributed cryptographic accumulator. Information Security, pages 372-388, 2002.
-
(2002)
Information Security
, pp. 372-388
-
-
Goodrich, M.1
Tamassia, R.2
Hasić, J.3
-
16
-
-
36448941716
-
-
NIST Special Publication
-
K. Kent, S. Chevalier, T. Grance, and H. Dang. Guide to integrating forensic techniques into incident response. NIST Special Publication, pages 800-86, 2006.
-
(2006)
Guide to Integrating Forensic Techniques into Incident Response
, pp. 800-886
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
19
-
-
65849178422
-
A new approach to secure logging
-
Mar.
-
D. Ma and G. Tsudik. A new approach to secure logging. Trans. Storage, 5(1):2:1-2:21, Mar. 2009.
-
(2009)
Trans. Storage
, vol.5
, Issue.1
-
-
Ma, D.1
Tsudik, G.2
-
20
-
-
84877993352
-
-
Accessed July 5th, 2012
-
Market Research Media. Global cloud computing market forecast 2015-2020. http://www.marketresearchmedia.com/2012/01/08/global-cloud-computing-market/. [Accessed July 5th, 2012].
-
Global Cloud Computing Market Forecast 2015-2020
-
-
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
84877974088
-
An explanation of computer forensics
-
J. Robbins. An explanation of computer forensics. National Forensics Center, 774:10-143, 2008.
-
(2008)
National Forensics Center
, vol.774
, pp. 10-143
-
-
Robbins, J.1
-
26
-
-
85021950441
-
Secure audit logs to support computer forensics
-
May
-
B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159-176, May 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
27
-
-
77955574175
-
Digital evidence in cloud computing systems
-
M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty. Digital evidence in cloud computing systems. Computer Law & Security Review, 26(3):304-308, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
31
-
-
77950845927
-
Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems
-
dec.
-
A. Yavuz and P. Ning. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In Computer Security Applications Conference, 2009. ACSAC '09. Annual, pages 219-228, dec. 2009.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC '09. Annual
, pp. 219-228
-
-
Yavuz, A.1
Ning, P.2
|