메뉴 건너뛰기




Volumn 4, Issue 4, 2013, Pages 76-85

Cloud forensics issues and opportunities

Author keywords

Cloud computing; Digital forensic; Forensic challenges; Information security

Indexed keywords


EID: 84880849005     PISSN: 20934009     EISSN: 2233940X     Source Type: Journal    
DOI: 10.4156/ijipm.vol4.issue4.9     Document Type: Article
Times cited : (26)

References (47)
  • 5
    • 67649425263 scopus 로고    scopus 로고
    • "Cloud computing - A question of trust,"
    • June
    • C. Everett. "Cloud computing - A question of trust," Computer Fraud & Security, pp. 5-7, June 2009.
    • (2009) Computer Fraud & Security , pp. 5-7
    • Everett, C.1
  • 8
    • 84857227025 scopus 로고    scopus 로고
    • Regeneration of events using system snapshots for cloud forensic analysis,
    • A. Belorkar, G. Geethakumari, "Regeneration of events using system snapshots for cloud forensic analysis," India Conference (INDICON), pp. 1-4, 2011.
    • (2011) India Conference (INDICON) , pp. 1-4
    • Belorkar, A.1    Geethakumari, G.2
  • 10
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing,
    • B. Martini, K. R. Choo, "An integrated conceptual digital forensic framework for cloud computing," Digital Investigation, pp. 1-10, 2012.
    • (2012) Digital Investigation , pp. 1-10
    • Martini, B.1    Choo, K.R.2
  • 12
    • 80155212257 scopus 로고    scopus 로고
    • Cloud computing: new challenges and opportunities,
    • R. Morrell and A. Chandrashekar, "Cloud computing: new challenges and opportunities," Network Security, pp. 18-19, 2011.
    • (2011) Network Security , pp. 18-19
    • Morrell, R.1    Chandrashekar, A.2
  • 17
  • 19
    • 84880771653 scopus 로고    scopus 로고
    • Fifth Annual Workshop on the Economics and Information Security
    • T. Moore, "The economics of digital forensics," Fifth Annual Workshop on the Economics and Information Security, 2006.
    • (2006) "The economics of digital forensics,"
    • Moore, T.1
  • 37
    • 70449450528 scopus 로고    scopus 로고
    • UPM: User-Centered Privacy Model in Pervasive Computing Systems,
    • A. Dehghantanha, R. Mahmod, "UPM: User-Centered Privacy Model in Pervasive Computing Systems," Future Computer and Communication, pp. 65-70, 2009.
    • (2009) Future Computer and Communication , pp. 65-70
    • Dehghantanha, A.1    Mahmod, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.