-
1
-
-
84881095993
-
An Investigation of the Impact of Cloud Computing on the Association of Chief Police Officers (ACPO)
-
University of Derby
-
L. Pimlott, An Investigation of the Impact of Cloud Computing on the Association of Chief Police Officers (ACPO) 'Good Practice Guide for Computer-Based Electronic Evidence, University of Derby, 2010.
-
(2010)
Good Practice Guide for Computer-Based Electronic Evidence
-
-
Pimlott, L.1
-
2
-
-
77955650428
-
Cyberattack on google said to hit password system
-
[Accessed 07 2012]
-
J. Markoff, (2010), "Cyberattack on Google Said to Hit Password System," The New York Times. [Online]. Available: http://www. nytimes. com/2010/04/20/technology/20google. ht ml?sudsredirect=true. [Accessed 07 2012].
-
(2010)
The New York Times
-
-
Markoff, J.1
-
8
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
CSA
-
CSA, "Security Guidance for Critical Areas of Focus in Cloud Computing," Cloud Security Alliance, 2009.
-
(2009)
Cloud Security Alliance
-
-
-
9
-
-
84966583232
-
-
NIST. [Accessed 09 2012]
-
NIST, (2012), "Definition of Cloud Computing," [Online]. Available: http://csrc. nist. gov/groups/SNS/cloudcomputing/index. html. [Accessed 09 2012].
-
(2012)
Definition of Cloud Computing
-
-
-
10
-
-
84958754081
-
Cloud forensics: An overview
-
K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, "Cloud forensics: An overview," in Proc. of the 7th IFIP International Conference on Digital Forensics, 2011.
-
(2011)
Proc. of the 7th IFIP International Conference on Digital Forensics
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
11
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
M. Taylor, J. Haggerty, D. Gresty and D. Lamb, "Forensic investigation of cloud computing systems," Network Security, no. 3, pp. 4-10, 2011.
-
(2011)
Network Security
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
15
-
-
77955959213
-
Cloud Computing: Benefits, risks and recommendations for information security
-
ENISA
-
ENISA, "Cloud Computing: Benefits, risks and recommendations for information security," European Network and information Security Agency, 2009.
-
(2009)
European Network and Information Security Agency
-
-
-
19
-
-
84881107698
-
Organizational preparedness for hosted virtual desktops in the context of digital forensics
-
J. Nirbhay and N. Ajit, "Organizational preparedness for hosted virtual desktops in the context of digital forensics," in Proc. of the SECAU Security Congress, 2011.
-
(2011)
Proc. of the SECAU Security Congress
-
-
Nirbhay, J.1
Ajit, N.2
-
20
-
-
54049127315
-
Forensics examination of volatile system data using virtual introspection
-
B. Hay and K. Nance, "Forensics examination of volatile system data using virtual introspection," ACM SIGOPS Operating Systems Review, vol. 42, no. 3, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.3
-
-
Hay, B.1
Nance, K.2
-
22
-
-
74049113467
-
Hadoop: The definitive guide
-
T. White, "Hadoop: The Definitive Guide," O'Reilly, 2009.
-
(2009)
O'Reilly
-
-
White, T.1
-
23
-
-
80053020228
-
Requirements for a forensically ready cloud storage service
-
T. Spyridopoulos and V. Katos,, "Requirements for a forensically ready cloud storage service," International Journal of Digital Crime and Forensics, no. 3(3), pp. 19-36, 2011.
-
(2011)
International Journal of Digital Crime and Forensics
, vol.3
, Issue.3
, pp. 19-36
-
-
Spyridopoulos, T.1
Katos, V.2
-
27
-
-
84881113275
-
-
Amazon. [Accessed 04 2012]
-
Amazon, (2010),"Elastic Block Store,". [Online]. Available: http://aws. amazon. com/ebs/. [Accessed 04 2012].
-
(2010)
Elastic Block Store
-
-
-
29
-
-
84881086899
-
-
Dell Corporation Limited, [Accessed 04 2012]
-
Dell Corporation Limited, (2009),"Dell Press Releases,". Available: http://i. dell. com/sites/content/business/solutions/brochures/e n/Documents/digital-forensics-blueprint. pdf. [Accessed 04 2012].
-
(2009)
Dell Press Releases
-
-
-
30
-
-
84864612252
-
Understanding issues in cloud computing: Two hypothetical case studies
-
J. Dykstra and A. T. Sherman, "Understanding issues in cloud computing: Two hypothetical case studies," Digital Investigation, vol. 3, no. 1, pp. Pages: 19-31, 2011.
-
(2011)
Digital Investigation
, vol.3
, Issue.1
, pp. 19-31
-
-
Dykstra, J.1
Sherman, A.T.2
|