메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1-189

Cloud Storage Forensics

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84902429611     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/C2013-0-09718-6     Document Type: Book
Times cited : (105)

References (167)
  • 1
    • 84902432457 scopus 로고    scopus 로고
    • ACPO. Good practice guidelines for computer based evidence v4.0, from Accessed 26.01.13.
    • ACPO. (2006). Good practice guidelines for computer based evidence v4.0, from Accessed 26.01.13. .
    • (2006)
  • 2
    • 84902422203 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services, from Accessed 26.01.13.
    • Chung, H., Park, J., Lee, S., & Kang, C. (2012). Digital forensic investigation of cloud storage services, from Accessed 26.01.13. .
    • (2012)
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 3
    • 84902414816 scopus 로고    scopus 로고
    • Faraday Bag testing in a reverberation chamber - a preliminary study, from Accessed 26.01.13.
    • Duffy, A. (2010). Faraday Bag testing in a reverberation chamber - a preliminary study, from Accessed 26.01.13. .
    • (2010)
    • Duffy, A.1
  • 4
    • 84902422200 scopus 로고    scopus 로고
    • The New PC Era- The Personal Cloud, from Accessed 26.01.13.
    • Kleynhans, S. (2012). The New PC Era- The Personal Cloud, from Accessed 26.01.13. .
    • (2012)
    • Kleynhans, S.1
  • 5
    • 84902427385 scopus 로고    scopus 로고
    • Introducing the Enron corpus. Paper presented at the First conference on email and anti-spam (CEAS).
    • Klimt, B., & Yang, Y. (2004). Introducing the Enron corpus. Paper presented at the First conference on email and anti-spam (CEAS).
    • (2004)
    • Klimt, B.1    Yang, Y.2
  • 6
    • 77954938144 scopus 로고    scopus 로고
    • Paper presented at the Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), 2010 Ninth International Conference on.
    • Laugesen, J., & Yuan, Y. (2010). What Factors Contributed to the Success of Apple's iPhone? Paper presented at the Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), 2010 Ninth International Conference on.
    • (2010) What Factors Contributed to the Success of Apple's iPhone?
    • Laugesen, J.1    Yuan, Y.2
  • 7
    • 84902427384 scopus 로고    scopus 로고
    • 31 May 2011. Dropbox Forensics, from Accessed 26.01.13.
    • McClain, F. (2011, 31 May 2011). Dropbox Forensics, from Accessed 26.01.13. .
    • (2011)
    • McClain, F.1
  • 8
    • 84902416981 scopus 로고    scopus 로고
    • Microsoft. How NTFS reserves space for its Master File Table (MFT), from Accessed 26.01.13.
    • Microsoft. (2008). How NTFS reserves space for its Master File Table (MFT), from Accessed 26.01.13. .
    • (2008)
  • 9
    • 84902432455 scopus 로고    scopus 로고
    • Microsoft. Shortcuts: frequently asked questions', from Accessed 26.01.13.
    • Microsoft. (2012a). Shortcuts: frequently asked questions', from Accessed 26.01.13. .
    • (2012)
  • 10
    • 84902416982 scopus 로고    scopus 로고
    • Microsoft. What is the prefetch folder? from Accessed 26.01.13.
    • Microsoft. (2012b). What is the prefetch folder? from Accessed 26.01.13. .
    • (2012)
  • 11
    • 84902432456 scopus 로고    scopus 로고
    • Windows 7 Forensics - Part IV - Thumbcache_*.db' Retrieved 29 March, 2013, from Accessed 26.01.13.
    • Mueller, L. (2010). Windows 7 Forensics - Part IV - Thumbcache_*.db' Retrieved 29 March, 2013, from Accessed 26.01.13. .
    • (2010)
    • Mueller, L.1
  • 12
    • 84902422199 scopus 로고    scopus 로고
    • NIJ. Electronic crime scene investigation: A guide for first responders (2nd ed.), from Accessed 26.01.13.
    • NIJ. (2008). Electronic crime scene investigation: A guide for first responders (2nd ed.), from Accessed 26.01.13. .
    • (2008)
  • 13
    • 84902416983 scopus 로고    scopus 로고
    • NIST. NIST computer forensic tool testing, from Accessed 26.01.13.
    • NIST. (2012). NIST computer forensic tool testing, from Accessed 26.01.13. .
    • (2012)
  • 14
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D., Choo K-K.R. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 15
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D., Choo K-K.R. Dropbox analysis: Data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 17
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • Taylor M., Haggerty J., Gresty D., Lamb D. Forensic investigation of cloud computing systems. Network Security 2011, 2011(3):4-10.
    • (2011) Network Security , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 18
    • 84902427383 scopus 로고
    • USDoD. DoD 5220.22-M-Sup 1, National Industrial Security Program Operating Manual Supplement, from Accessed 26.01.13.
    • USDoD. (1995). DoD 5220.22-M-Sup 1, National Industrial Security Program Operating Manual Supplement, from Accessed 26.01.13. .
    • (1995)
  • 19
    • 84902422197 scopus 로고    scopus 로고
    • W3Counter. Browser Statistics July 2012, from Accessed 26.01.13.
    • W3Counter. (2012). Browser Statistics July 2012, from Accessed 26.01.13. .
    • (2012)
  • 20
    • 84902427381 scopus 로고    scopus 로고
    • Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies. AUT University.
    • Zhu, M. (2011). Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies. AUT University.
    • (2011)
    • Zhu, M.1
  • 22
    • 84883674595 scopus 로고    scopus 로고
    • Australian Crime Commission (ACC), Australian Crime Commission, Canberra, ACT
    • Australian Crime Commission (ACC) Serious and organised investment fraud in Australia 2012, Australian Crime Commission, Canberra, ACT.
    • (2012) Serious and organised investment fraud in Australia
  • 24
    • 84902422195 scopus 로고    scopus 로고
    • Australian Government Parliamentary Joint Committee on Intelligence and Security. Proof Committee Hansard (Public) Wednesday, 5 September 2012.
    • Australian Government Parliamentary Joint Committee on Intelligence and Security. (2012). Proof Committee Hansard (Public) Wednesday, 5 September 2012. . .
    • (2012)
  • 25
    • 84877796028 scopus 로고    scopus 로고
    • Cloud rains opportunities for software developers
    • 29 May 2009
    • Bartholomew D. Cloud rains opportunities for software developers. Dice 2009, 29 May 2009.
    • (2009) Dice
    • Bartholomew, D.1
  • 26
    • 84858712240 scopus 로고    scopus 로고
    • Technical issues of forensic investigations in cloud computing environments
    • Proceedings of 6th international workshop on systematic approaches to digital forensic engineering (IEEE/SADFE 2011) Oakland, CA, USA.
    • Birk, D., & Wegener, C. (2011). Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 6th international workshop on systematic approaches to digital forensic engineering (IEEE/SADFE 2011) (pp. 1-10). Oakland, CA, USA.
    • (2011) , pp. 1-10
    • Birk, D.1    Wegener, C.2
  • 27
    • 84863083301 scopus 로고    scopus 로고
    • Google CEO's new paradigm: 'Cloud computing and advertising go hand-inhand'
    • 2006. 23 April.
    • Bogatin D. Google CEO's new paradigm: 'Cloud computing and advertising go hand-inhand'. Zdnet 2006, 2006. 23 April. .
    • (2006) Zdnet
    • Bogatin, D.1
  • 28
    • 84889090807 scopus 로고    scopus 로고
    • Cybercrime investigation and prosecution: The role of penal and procedural law
    • Brenner S. Cybercrime investigation and prosecution: The role of penal and procedural law. Murdoch University Electronic Journal of Law 2001, 8(2). .
    • (2001) Murdoch University Electronic Journal of Law , vol.8 , Issue.2
    • Brenner, S.1
  • 29
    • 84902422196 scopus 로고    scopus 로고
    • Cybercrime cost Australia over $4.5 billion last year
    • 8 September
    • Caldwell A. Cybercrime cost Australia over $4.5 billion last year. ABC Radio National 2011, 8 September, http://www.abc.net.au/am/content/2011/s3312727.htm.
    • (2011) ABC Radio National
    • Caldwell, A.1
  • 31
    • 80054030971 scopus 로고    scopus 로고
    • Responding to online child sexual grooming: An industry perspective
    • Choo K.-K.R. Responding to online child sexual grooming: An industry perspective. Trends & Issues in Crime and Criminal Justice 2009, 379:1-6.
    • (2009) Trends & Issues in Crime and Criminal Justice , vol.379 , pp. 1-6
    • Choo, K.-K.R.1
  • 33
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo K.-K.R. The cyber threat landscape: Challenges and future research directions. Computers & Security 2011, 30(8):719-731.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 35
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • Chung H., Park J., Lee S., Kang C. Digital forensic investigation of cloud storage services. Digital Investigation 2012, 9(2):81-95.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 38
    • 84876187834 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA), European Network and Information Security Agency, Heraklion, Greece
    • European Network and Information Security Agency (ENISA) Procure secure: A guide to monitoring of security service levels in cloud contracts 2012, European Network and Information Security Agency, Heraklion, Greece.
    • (2012) Procure secure: A guide to monitoring of security service levels in cloud contracts
  • 41
    • 84902427380 scopus 로고    scopus 로고
    • Gartner. Gartner says that consumers will store more than a third of their digital content in the cloud by 2016.
    • Gartner. (2012). Gartner says that consumers will store more than a third of their digital content in the cloud by 2016. .
    • (2012)
  • 42
    • 84902416979 scopus 로고    scopus 로고
    • Google. Google trends: Cloud computing
    • Google. (2013). Google trends: Cloud computing. .
    • (2013)
  • 43
    • 84902422194 scopus 로고    scopus 로고
    • Exposing Norton's cybercrime scare campaign
    • 21 September
    • Gray P. Exposing Norton's cybercrime scare campaign. The Age 2011, 21 September, .
    • (2011) The Age
    • Gray, P.1
  • 44
    • 84875598792 scopus 로고    scopus 로고
    • Between hype and understatement: Reassessing cyber risks as a security strategy
    • Guinchard A. Between hype and understatement: Reassessing cyber risks as a security strategy. Journal of Strategic Security 2011, IV(2):75-96.
    • (2011) Journal of Strategic Security , vol.IV , Issue.2 , pp. 75-96
    • Guinchard, A.1
  • 45
    • 84875582572 scopus 로고    scopus 로고
    • Collaborating with a digital forensics expert: Ultimate tag-team or disastrous duo?
    • Harrington S. Collaborating with a digital forensics expert: Ultimate tag-team or disastrous duo?. William Mitchell Law Review 2011, 38(1):354-393.
    • (2011) William Mitchell Law Review , vol.38 , Issue.1 , pp. 354-393
    • Harrington, S.1
  • 46
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • July/August
    • Kaufman L.M. Data security in the world of cloud computing. IEEE Security & Privacy 2009, July/August:61-64.
    • (2009) IEEE Security & Privacy , pp. 61-64
    • Kaufman, L.M.1
  • 47
    • 85013973534 scopus 로고    scopus 로고
    • Storage-As-A-Service poised for big boost
    • Kovar J. Storage-As-A-Service poised for big boost. CRN 2009, 1291:14-18.
    • (2009) CRN , vol.1291 , pp. 14-18
    • Kovar, J.1
  • 48
    • 84902422191 scopus 로고    scopus 로고
    • Microsoft confirms it will change SkyDrive name after trademark suit
    • 31 July
    • Ludwig S. Microsoft confirms it will change SkyDrive name after trademark suit. Venturebeat.com 2013, 31 July, http://venturebeat.com/2013/07/31/microsoft-changing-skydrive-name/%23f7TzSaVh4WmxQh6Z.99.
    • (2013) Venturebeat.com
    • Ludwig, S.1
  • 49
    • 84902416977 scopus 로고    scopus 로고
    • Challenging security requirements for US government cloud computing adoption
    • Iorga, M. (2012). Challenging security requirements for US government cloud computing adoption. .
    • (2012)
    • Iorga, M.1
  • 50
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B., Choo K.-K.R. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2012, 9(2):71-80.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 51
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a Case Study
    • Martini B., Choo K.-K.R. Cloud storage forensics: ownCloud as a Case Study. Digital Investigation, In press 2013, http://dx.doi.org/10.1016/j.diin.2013.08.005.
    • (2013) Digital Investigation, In press
    • Martini, B.1    Choo, K.-K.R.2
  • 52
    • 79959322079 scopus 로고    scopus 로고
    • Proceedings of 2011 ACM symposium on applied computing, Taichung, Taiwan
    • Marty, R. (2011). Cloud application logging for forensics. In: Proceedings of 2011 ACM symposium on applied computing, Taichung, Taiwan, pp. 178-184.
    • (2011) Cloud application logging for forensics. , pp. 178-184
    • Marty, R.1
  • 53
    • 84902427379 scopus 로고    scopus 로고
    • The 2011 Gartner scenario: Current states and future directions of the IT industry. Gartner.
    • McGee, K. (2011). The 2011 Gartner scenario: Current states and future directions of the IT industry. Gartner.
    • (2011)
    • McGee, K.1
  • 54
  • 56
    • 84875584432 scopus 로고    scopus 로고
    • Norton-Symantec, Symantec Corporation, Mountain View, CA
    • Norton-Symantec Cybercrime report: The human impact 2011, Symantec Corporation, Mountain View, CA.
    • (2011) Cybercrime report: The human impact
  • 57
    • 84902416978 scopus 로고    scopus 로고
    • Keeping secrets in the cloud: how to protect your intellectual property in the cloud
    • 6 February
    • Overby S. Keeping secrets in the cloud: how to protect your intellectual property in the cloud. CIO Magazine 2012, 6 February, .
    • (2012) CIO Magazine
    • Overby, S.1
  • 58
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D., Choo K.-K.R. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 59
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D., Choo K.-K.R. Dropbox analysis: Data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 61
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    • Quick D., Choo K.-K.R. Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digital Investigation 2013, 10(3):266-277.
    • (2013) Digital Investigation , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 64
    • 84902416975 scopus 로고    scopus 로고
    • Symantec Cyber crime has surpassed illegal drug trafficking as a criminal moneymaker; 1 in 5 will become a Victim
    • 10 September
    • Symantec Cyber crime has surpassed illegal drug trafficking as a criminal moneymaker; 1 in 5 will become a Victim. Press Release 2009, 10 September, .
    • (2009) Press Release
  • 65
    • 84902432454 scopus 로고    scopus 로고
    • Cyber-crime, securities markets and systemic risk: Joint Staff Working Paper of the IOSCO Research Department and World Federation of Exchanges.
    • Tendulkar, R. (2013). Cyber-crime, securities markets and systemic risk: Joint Staff Working Paper of the IOSCO Research Department and World Federation of Exchanges. .
    • (2013)
    • Tendulkar, R.1
  • 67
    • 84889091912 scopus 로고    scopus 로고
    • Cloud-based data storage
    • Waters J. Cloud-based data storage. The Education Digest 2011, 76(8):28-34.
    • (2011) The Education Digest , vol.76 , Issue.8 , pp. 28-34
    • Waters, J.1
  • 68
    • 84889095749 scopus 로고    scopus 로고
    • How to choose a storage as a service provider
    • 18 February
    • Wipperfeld M. How to choose a storage as a service provider. eWeek 2009, 18 February.
    • (2009) eWeek
    • Wipperfeld, M.1
  • 69
    • 84902422190 scopus 로고    scopus 로고
    • ACPO, Good Practice Guidelines for Computer Based Evidence v4.0
    • ACPO (2006). Good Practice Guidelines for Computer Based Evidence v4.0, from .
    • (2006)
  • 72
    • 84902422187 scopus 로고    scopus 로고
    • IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective
    • In press
    • Butler A., Choo K.K.R. IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective. Security Journal 2013, In press.
    • (2013) Security Journal
    • Butler, A.1    Choo, K.K.R.2
  • 73
    • 33745505202 scopus 로고    scopus 로고
    • Managing corporate computer forensics
    • doi: citeulike-article-id:6856200
    • Haggerty J., Taylor M. Managing corporate computer forensics. Computer Fraud and Security 2006, 2006(6):14-16. doi: citeulike-article-id:6856200.
    • (2006) Computer Fraud and Security , vol.2006 , Issue.6 , pp. 14-16
    • Haggerty, J.1    Taylor, M.2
  • 75
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B., Choo K.K.R. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2012, 9(2):71-80.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.K.R.2
  • 77
    • 84902422188 scopus 로고    scopus 로고
    • NIJ. Forensic examination of digital evidence: A guide for law enforcement
    • NIJ. (2004). Forensic examination of digital evidence: A guide for law enforcement, from .
    • (2004)
  • 78
    • 84902422189 scopus 로고    scopus 로고
    • NIJ. Electronic crime scene investigation: A guide for first responders (2nd ed.)
    • NIJ. (2008). Electronic crime scene investigation: A guide for first responders (2nd ed.), from .
    • (2008)
  • 80
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D., Choo K.K.R. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.K.R.2
  • 81
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D., Choo K.K.R. Dropbox analysis: Data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.K.R.2
  • 85
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • Taylor M., Haggerty J., Gresty D., Lamb D. Forensic investigation of cloud computing systems. Network Security 2011, 2011(3):4-10.
    • (2011) Network Security , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 86
    • 56749104738 scopus 로고    scopus 로고
    • Willassen, S. (2008). Using simplified event calculus in digital investigation. Paper presented at the SAC '08: Proceedings of the 2008 ACM symposium on Applied computing, Fortaleza, Ceara, Brazil.
    • Willassen, S. (2008). Using simplified event calculus in digital investigation. Paper presented at the SAC '08: Proceedings of the 2008 ACM symposium on Applied computing, Fortaleza, Ceara, Brazil.
  • 87
    • 84902432451 scopus 로고    scopus 로고
    • Paper presented at the InfoSecCD '06: Proceedings of the third annual conference on Information security curriculum development, Kennesaw, Georgia.
    • Yeager, R. (2006). Criminal computer forensics management. Paper presented at the InfoSecCD '06: Proceedings of the third annual conference on Information security curriculum development, Kennesaw, Georgia.
    • (2006) Criminal computer forensics management.
    • Yeager, R.1
  • 88
    • 84902422186 scopus 로고    scopus 로고
    • Architecture Technologies. (2011). Dropbox Reader V1.1 2011 (Google Cache), viewed 23 January 2013, Accessed 10.02.13.
    • Architecture Technologies. (2011). Dropbox Reader V1.1 2011 (Google Cache), viewed 23 January 2013, Accessed 10.02.13. .
  • 89
    • 84902432452 scopus 로고    scopus 로고
    • Association of Chief Police Officers (ACPO). Good Practice Guidelines for Computer Based Evidence v4.0. Accessed 10.02.13.
    • Association of Chief Police Officers (ACPO). (2006). Good Practice Guidelines for Computer Based Evidence v4.0. Accessed 10.02.13. .
    • (2006)
  • 90
    • 84902432453 scopus 로고    scopus 로고
    • Dropbox. Contact web page - legal inquiries. Accessed 10.02.13.
    • Dropbox. (2012). Contact web page - legal inquiries. Accessed 10.02.13. https://www.dropbox.com/contact/.
    • (2012)
  • 92
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B, Choo K-K.R. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2012, 9(2):71-80.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 93
    • 84902416973 scopus 로고    scopus 로고
    • Dropbox Forensics
    • Accessed 10.02.13
    • McClain F. Dropbox Forensics. Forensic Focus 2011, Accessed 10.02.13.
    • (2011) Forensic Focus
    • McClain, F.1
  • 96
    • 84902422185 scopus 로고    scopus 로고
    • MagnetSoftware. 'IEF Triage', viewed 10 February 2013, Accessed 10.02.13.
    • MagnetSoftware. (2013). 'IEF Triage', viewed 10 February 2013, Accessed 10.02.13. .
    • (2013)
  • 97
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D., Choo K-K.R. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 98
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D., Choo K-K.R. Dropbox analysis: Data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 99
    • 84902427375 scopus 로고    scopus 로고
    • Microsoft sysinternals process monitor, viewed 23 January 2013, Accessed 10.02.13.
    • Russinovich, M., & Cogswell, B. (2012). Microsoft sysinternals process monitor, viewed 23 January 2013, Accessed 10.02.13. .
    • (2012)
    • Russinovich, M.1    Cogswell, B.2
  • 100
    • 84902427376 scopus 로고
    • USDoD, Dod 5220.22-M-Sup 1, National industrial security program operating manual supplement. Accessed 10.02.13.
    • USDoD. (1995). Dod 5220.22-M-Sup 1, National industrial security program operating manual supplement. Accessed 10.02.13. .
    • (1995)
  • 101
    • 84870235296 scopus 로고    scopus 로고
    • The digital forensics cyber exchange principle
    • Forensic Magazine. December 2011 - January 2012
    • Zatyko, K., & Bay, J. (2012). The digital forensics cyber exchange principle. Forensic Magazine. December 2011 - January 2012, pp. 13-15.
    • (2012) , pp. 13-15
    • Zatyko, K.1    Bay, J.2
  • 102
    • 84902432448 scopus 로고    scopus 로고
    • Association of Chief Police Officers (ACPO). Good practice guidelines for computer based evidence v4.0. Accessed 02.10.12.
    • Association of Chief Police Officers (ACPO). (2006). Good practice guidelines for computer based evidence v4.0. Accessed 02.10.12. .
    • (2006)
  • 103
    • 84902427373 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services, digital investigation. Accessed 02.10.12.
    • Chung, H., Park, J., Lee, S., & Kang, C. (2012). Digital forensic investigation of cloud storage services, digital investigation. Accessed 02.10.12. .
    • (2012)
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 104
    • 84902432449 scopus 로고    scopus 로고
    • 'Faraday bag testing in a reverberation chamber - a preliminary study'. Accessed 02.10.12.
    • Duffy, A. (2010). 'Faraday bag testing in a reverberation chamber - a preliminary study'. Accessed 02.10.12. .
    • (2010)
    • Duffy, A.1
  • 105
    • 84902427374 scopus 로고    scopus 로고
    • The new PC Era- the personal cloud. Gartner Inc. Accessed 02.10.12.
    • Kleynhans, S. (2012). The new PC Era- the personal cloud. Gartner Inc. Accessed 02.10.12. .
    • (2012)
    • Kleynhans, S.1
  • 106
    • 84902416973 scopus 로고    scopus 로고
    • Dropbox Forensics
    • Accessed 02.10.12
    • McClain F. Dropbox Forensics. Forensic Focus 2011, Accessed 02.10.12.
    • (2011) Forensic Focus
    • McClain, F.1
  • 107
    • 84902422183 scopus 로고    scopus 로고
    • Microsoft. How NTFS reserves space for its master file table (MFT). Accessed 02.10.12.
    • Microsoft. (2008). How NTFS reserves space for its master file table (MFT). Accessed 02.10.12. .
    • (2008)
  • 108
    • 84902422184 scopus 로고    scopus 로고
    • Microsoft. Shortcuts: frequently asked questions. Accessed 02.10.12.
    • Microsoft. (2012a). Shortcuts: frequently asked questions. Accessed 02.10.12. .
    • (2012)
  • 109
    • 84875202316 scopus 로고    scopus 로고
    • What is the prefetch folder?
    • Microsoft. Accessed 02.10.12.
    • Microsoft. (2012b). What is the prefetch folder? Accessed 02.10.12. .
    • (2012)
  • 110
    • 84902427371 scopus 로고    scopus 로고
    • Windows 7 Forensics - Part IV - Thumbcache_*.db. Accessed 02.10.12.
    • Mueller, L. (2010). Windows 7 Forensics - Part IV - Thumbcache_*.db. Accessed 02.10.12. .
    • (2010)
    • Mueller, L.1
  • 113
    • 84875123657 scopus 로고    scopus 로고
    • Office of Law Enforcement Standards of the National Institute of Standards and Technology (NIST). Accessed 02.10.12.
    • Office of Law Enforcement Standards of the National Institute of Standards and Technology (NIST). (2012). NIST computer forensic tool testing. Accessed 02.10.12. .
    • (2012) NIST computer forensic tool testing
  • 114
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: microsoft SkyDrive forensic data remnants
    • Quick D., Choo K. Digital droplets: microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.2
  • 115
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: data remnants on user machines
    • Quick D., Choo K. Dropbox analysis: data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.2
  • 117
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • ISSN 1084-8045, doi:10.1016/j.jnca.2010.07.006
    • Subashini S., Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011, 34(1):1-11. ISSN 1084-8045, doi:10.1016/j.jnca.2010.07.006.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 118
    • 84902432447 scopus 로고    scopus 로고
    • W3Counter.Browser statistics July 2012. Accessed 02.10.12.
    • W3Counter. (2012). Browser statistics July 2012. Accessed 02.10.12. .
    • (2012)
  • 119
    • 84902427372 scopus 로고    scopus 로고
    • AARNET. CloudStor+. Retrieved 10 April 2013
    • AARNET. (2013). CloudStor+. Retrieved 10 April 2013, from . .
    • (2013)
  • 120
    • 84902416971 scopus 로고    scopus 로고
    • Australian Government Attorney-General's Department, Australian Government Policy and Risk management guidelines for the storage and processing of Australian Government information in outsourced or offshore ICT arrangements
    • Australian Government Attorney-General's Department. (2013). Australian Government Policy and Risk management guidelines for the storage and processing of Australian Government information in outsourced or offshore ICT arrangements, from . .
    • (2013)
  • 121
    • 84902416969 scopus 로고    scopus 로고
    • Australian Government Department of Broadband, Communications and the Digital Economy. The national cloud computing strategy
    • Australian Government Department of Broadband, Communications and the Digital Economy. (2013). The national cloud computing strategy, from . .
    • (2013)
  • 122
    • 84902422516 scopus 로고    scopus 로고
    • Australian Government Parliamentary Joint Committee on Intelligence and Security. Wednesday, 5 September 2012
    • Australian Government Parliamentary Joint Committee on Intelligence and Security. (2012). Proof committee hansard (Public) Wednesday, 5 September 2012, from . .
    • (2012) Proof committee hansard (Public)
  • 125
    • 84876187834 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA). Heraklion, Greece. European Network and Information Security Agency.
    • European Network and Information Security Agency (ENISA). (2012). Procure Secure: A guide to Monitoring of Security Service Levels in Cloud Contracts. Heraklion, Greece. European Network and Information Security Agency.
    • (2012) Procure Secure: A guide to Monitoring of Security Service Levels in Cloud Contracts
  • 126
    • 84902422182 scopus 로고    scopus 로고
    • Google. Google trends - web search interest: owncloud - worldwide, 2004 - present. Retrieved 12 July 2013
    • Google. (2013). Google trends - web search interest: owncloud - worldwide, 2004 - present. Retrieved 12 July 2013, from . .
    • (2013)
  • 127
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in Australia
    • doi
    • Hooper C., Martini B., Choo K.-K.R. Cloud computing and its implications for cybercrime investigations in Australia. Computer Law & Security Review 2013, 29(2):152-163. doi: .
    • (2013) Computer Law & Security Review , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 129
    • 84902427370 scopus 로고    scopus 로고
    • OwnCloud 4.0 and Encryption. Retrieved 24 September 2012
    • Junod, P. (2012). OwnCloud 4.0 and Encryption. Retrieved 24 September 2012, from . .
    • (2012)
    • Junod, P.1
  • 131
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B., Choo K.-K.R. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2012, 9(2):71-80.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 132
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a case study
    • In press. doi
    • Martini B., Choo K-K.R. Cloud storage forensics: ownCloud as a case study. Digital Investigation 2013, In press. doi: http://dx.doi.org/10.1016/j.diin.2013.08.005].
    • (2013) Digital Investigation
    • Martini, B.1    Choo, K.-K.R.2
  • 135
    • 84889103076 scopus 로고    scopus 로고
    • ownCloud. Retrieved 12 July 2013
    • ownCloud. (2013). Sync Clients | ownCloud.org. Retrieved 12 July 2013, from . .
    • (2013) Sync Clients | ownCloud.org
  • 137
    • 84889086422 scopus 로고    scopus 로고
    • United Nations Office on Drugs and Crime (UNODC), United Nations, New York, US
    • United Nations Office on Drugs and Crime (UNODC) The use of the Internet for terrorist purposes 2012, United Nations, New York, US.
    • (2012) The use of the Internet for terrorist purposes
  • 138
    • 35248883259 scopus 로고    scopus 로고
    • United States National Institute of Justice (US NIJ), U.S. Department of Justice, Washington, DC
    • United States National Institute of Justice (US NIJ) Forensic examination of digital evidence: a guide for law enforcement 2004, U.S. Department of Justice, Washington, DC.
    • (2004) Forensic examination of digital evidence: a guide for law enforcement
  • 139
    • 84902416967 scopus 로고    scopus 로고
    • ACPO. (2006). Good practice guidelines for computer based evidence v4.0, Available from .
    • ACPO. (2006). Good practice guidelines for computer based evidence v4.0, Available from . .
  • 141
  • 142
    • 84902418256 scopus 로고    scopus 로고
    • Dropbox.
    • Dropbox. (2012). Contact web page-legal enquiries, Available from . https://www.dropbox.com/contact/.
    • (2012) Contact web page-legal enquiries
  • 143
    • 84897990024 scopus 로고    scopus 로고
    • DropBox, Retrieved 17 February 2013
    • DropBox. (2013a). Privacy policy Retrieved 17 February 2013, Available from . https://www.dropbox.com/dmca#privacy.
    • (2013) Privacy policy
  • 144
    • 84884586407 scopus 로고    scopus 로고
    • DropBox Retrieved 17 February 2013
    • DropBox. (2013b). Security overview Retrieved 17 February 2013, Available from . https://www.dropbox.com/dmca#security.
    • (2013) Security overview
  • 145
    • 84889860414 scopus 로고    scopus 로고
    • DropBox, Retrieved 17 February 2013
    • DropBox. (2013c). Terms of service Retrieved 17 February 2013, Available from . https://www.dropbox.com/dmca#terms.
    • (2013) Terms of service
  • 146
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
    • Dykstra J., Sherman A. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 2012.
    • (2012) Digital Investigation
    • Dykstra, J.1    Sherman, A.2
  • 147
    • 84902422180 scopus 로고    scopus 로고
    • Google. Official blog, June 29, 2012 Retrieved 17 February 2013
    • Google. (2012). Official blog, June 29, 2012 Retrieved 17 February 2013, Available from . .
    • (2012)
  • 148
    • 84902432444 scopus 로고    scopus 로고
    • Google. Legal process, Retrieved 3 February 2013
    • Google. (2013). Legal process, Retrieved 3 February 2013, Available from . .
    • (2013)
  • 149
    • 84902422181 scopus 로고    scopus 로고
    • In Paper presented at the First conference on email and anti-spam (CEAS).
    • Klimt, B., & Yang, Y. (2004). Introducing the Enron corpus. In Paper presented at the First conference on email and anti-spam (CEAS).
    • (2004) Introducing the Enron corpus
    • Klimt, B.1    Yang, Y.2
  • 151
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a case study
    • In press. DOI
    • Martini B., Choo K.-K.R. Cloud storage forensics: ownCloud as a case study. Digital Investigation 2013, In press. DOI: http://dx.doi.org/10.1016/j.diin.2013.08.005].
    • (2013) Digital Investigation
    • Martini, B.1    Choo, K.-K.R.2
  • 152
    • 84902416968 scopus 로고    scopus 로고
    • 31 May 2011 Dropbox forensics
    • McClain, F. (2011, 31 May 2011). Dropbox forensics, Available from . .
    • (2011)
    • McClain, F.1
  • 155
    • 84902432445 scopus 로고    scopus 로고
    • Microsoft. Services agreement, Retrieved 17 February 2013
    • Microsoft. (2013). Services agreement, Retrieved 17 February 2013, Available from . .
    • (2013)
  • 158
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D., Choo K. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 2013, 29(6):1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.2
  • 159
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D., Choo K. Dropbox analysis: Data remnants on user machines. Digital Investigation 2013, 10(1):3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.2
  • 160
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data:does the act of collection result in changes to the data or its metadata?
    • Quick D. & Choo K.-K. R. (2013c). Forensic collection of cloud storage data:does the act of collection result in changes to the data or its metadata? Digital Investigation, 10(3), 266-277.
    • (2013) Digital Investigation , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 163
    • 84902427369 scopus 로고    scopus 로고
    • Dropbox popularity explodes in 2011, now serves 25 million users, Retrieved 17 February 2013
    • Rosenberg, A. (2011). Dropbox popularity explodes in 2011, now serves 25 million users, Retrieved 17 February 2013, Available from . .
    • (2011)
    • Rosenberg, A.1
  • 166
    • 84902427368 scopus 로고    scopus 로고
    • Windows 8 launch, retrieved 25 January 2013
    • Sinofsky, S. (2012). Windows 8 launch, retrieved 25 January 2013, Available from . .
    • (2012)
    • Sinofsky, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.