메뉴 건너뛰기




Volumn , Issue , 2014, Pages 129-138

Privacy-respecting digital investigation

Author keywords

Digital Forensics; Digital Investigation; Privacy

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES;

EID: 84910046949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2014.6890932     Document Type: Conference Paper
Times cited : (55)

References (65)
  • 2
    • 84876675786 scopus 로고    scopus 로고
    • The council of europe convention on cybercrime: Defining crime in digital world
    • J.Clough, "The Council of Europe Convention on Cybercrime: Defining Crime in Digital World," in Criminal Law Forum 2012, pp. 363-391, 2012.
    • (2012) Criminal Law Forum 2012 , pp. 363-391
    • Clough, J.1
  • 4
    • 84855240039 scopus 로고    scopus 로고
    • Research on relevant problems of computer crime forensics
    • W.X.Guang, "Research on Relevant Problems of Computer Crime Forensics," in Proc. of ICCE2011, AISC 112, pp. 169-173.
    • Proc. of ICCE2011, AISC 112 , pp. 169-173
    • Guang, W.X.1
  • 5
    • 84886588367 scopus 로고    scopus 로고
    • European Parliament-directorate general for internal policies policy department C: citizens' rights and constitutional affairs
    • European Parliament-directorate general for internal policies policy department C: citizens' rights and constitutional affairs, "Fighting Cyber-Crime and Protecting Privacy", 2012.
    • (2012) Fighting Cyber-Crime and Protecting Privacy
  • 6
    • 84910042543 scopus 로고    scopus 로고
    • Personvern 2013-"Tilstand OG Trender Tecknologiradet.no, Oslo, Rapport 1/2013, ISBN 978-82-92447-57-4
    • Personvern 2013-"Tilstand OG Trender", Tecknologiradet.no, Oslo, Rapport 1/2013, ISBN 978-82-92447-57-4.
  • 8
    • 84910084043 scopus 로고    scopus 로고
    • EU fights corruption 05-Mar-2013. Report
    • "EU fights corruption", 05-Mar-2013. Report available at: http://www.neurope.eu/article/eu-fights-corruption
  • 9
    • 84910062736 scopus 로고    scopus 로고
    • com Report of Jul
    • Magnir.com Report of Jul 2013 accessible at: http://www.magnir.com/2013/07/digging-for-data-skillsdemand-for-digital-forensics-employees-increasing
    • (2013)
  • 11
    • 84883556196 scopus 로고    scopus 로고
    • A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview
    • J.I.James, P.Gladyshev, "A Survey of Digital Forensic Investigator Decision Processes and Measurement of Decisions based on Enhanced Preview," in Elsevier Journal of Digital Investigation, Volume 10, Issue 2, Pages 148-157, 2013.
    • (2013) Elsevier Journal of Digital Investigation , vol.10 , Issue.2 , pp. 148-157
    • James, J.I.1    Gladyshev, P.2
  • 15
    • 84910084041 scopus 로고    scopus 로고
    • The legal protection of privacy in international practices: Potential as models for a chinese privacy protection regime
    • Chapter 4, Sprigner-Verlag
    • H.Wang, "The Legal Protection of Privacy in International Practices: Potential as Models for a Chinese Privacy Protection Regime," Protecting Privacy in China, Chapter 4, Sprigner-Verlag, 2011.
    • (2011) Protecting Privacy in China
    • Wang, H.1
  • 17
    • 77954503972 scopus 로고    scopus 로고
    • Senate Banking Committee(Gramm-Leach-Bliley act)-disclosure of non-public personal information"
    • Senate Banking Committee, "Financial modernization act of 1999, (Gramm-Leach-Bliley act)-disclosure of non-public personal information".
    • (1999) Financial Modernization Act of
  • 19
    • 0345977514 scopus 로고
    • Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Union (EU) Tech. Rep
    • European Union (EU), "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," European Community(EU), Tech. Rep., 1995.
    • (1995) European Community(EU)
  • 20
    • 84865103441 scopus 로고    scopus 로고
    • Effects of data anonymization on the data mining results
    • Croatia
    • I. Buratovic, M.Milicevic, K.Zubrinic, "Effects of Data Anonymization on the Data Mining Results," in Proc. of MIPRO 2012, pp. 1619-1623, Croatia.
    • (2012) Proc. of MIPRO , pp. 1619-1623
    • Buratovic, I.1    Milicevic, M.2    Zubrinic, K.3
  • 22
    • 84910042541 scopus 로고    scopus 로고
    • Understanding privacy policies-A study in empirical analysis of language usage
    • Special Issue, Mar
    • R.Lammel, E. Pek, "Understanding Privacy Policies-A Study in Empirical Analysis of Language Usage," Empirical Software Engineering, Special Issue, Mar 2012.
    • (2012) Empirical Software Engineering
    • Lammel, R.1    Pek, E.2
  • 23
    • 78650047205 scopus 로고    scopus 로고
    • Logical methods in security and privacy
    • A.Datta, "Logical Methods in Security and Privacy," in Security and Privacy, Vol.8, Issue 6, pp. 86-89, 2010.
    • (2010) Security and Privacy , vol.8 , Issue.6 , pp. 86-89
    • Datta, A.1
  • 28
    • 77249085149 scopus 로고    scopus 로고
    • How internet users' privacy concerns have evolved since
    • A.I.Anton, J. B. Earp, J.D. Young, "How Internet Users' Privacy Concerns Have Evolved Since 2002," In IEEE J. of Security and Privacy, Vol 8, Issue 1, pp. 21-27.
    • (2002) IEEE J. of Security and Privacy , vol.8 , Issue.1 , pp. 21-27
    • Anton, A.I.1    Earp, J.B.2    Young, J.D.3
  • 29
    • 77957911953 scopus 로고    scopus 로고
    • A framework for privacy policy management in service aggregation
    • Shanghai, China
    • P.Wang, L.Dong, Y.Mu, W.Susilo, and J.Yan, "A Framework for Privacy Policy Management in Service Aggregation," in Proc. of CSCWD2010, pp. 166-171, Shanghai, China.
    • Proc. of CSCWD2010 , pp. 166-171
    • Wang, P.1    Dong, L.2    Mu, Y.3    Susilo, W.4    Yan, J.5
  • 33
    • 79951929550 scopus 로고    scopus 로고
    • Policy-based data downgrading: Toward a semantic framework and automated tools to balance need-to-protect and need-to-share policies
    • G.Denker, A.Gehani, M.Kim, D.Hanz, "Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies," in Proc. of POLICY 2010, pp. 120-128.
    • (2010) Proc. of POLICY , pp. 120-128
    • Denker, G.1    Gehani, A.2    Kim, M.3    Hanz, D.4
  • 34
    • 77954389787 scopus 로고    scopus 로고
    • Model checking based security policy verification and validation
    • J.Ma, D.Zhang, G.Xu, Y.Yang, "Model Checking Based Security Policy Verification and Validation," in the Proc. of ISA 2010, pp 18-22.
    • (2010) The Proc. of ISA , pp. 18-22
    • Ma, J.1    Zhang, D.2    Xu, G.3    Yang, Y.4
  • 35
    • 84874580410 scopus 로고    scopus 로고
    • Technical, legal and ethical dilemmas: Distinguishing risks arising from malware and cyber-attack tools in the 'cloud'-A forensic computing perspective
    • V.Broucek, P.Turner, " Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud'-A forensic computing perspective," in Computer Virology, DOI 10.1007/s11416-012-0173-0, 2012.
    • (2012) Computer Virology
    • Broucek, V.1    Turner, P.2
  • 36
    • 77952413466 scopus 로고    scopus 로고
    • A framework to guide the implementation of proactive digital forensics in organizations
    • C.P.Grobler, C.P.Louwrens, S.H.Solms, "A Framework to Guide the Implementation of Proactive Digital Forensics in Organizations," in Proc. of ARES 2010, pp. 677-682.
    • (2010) Proc. of ARES , pp. 677-682
    • Grobler, C.P.1    Louwrens, C.P.2    Solms, S.H.3
  • 37
  • 41
    • 77955860747 scopus 로고    scopus 로고
    • The importance of corporate forensics readiness in the information security framework
    • G.Pangalos, C. Iliodis, I.Pagkalos, "The Importance of Corporate Forensics Readiness in the Information Security Framework," in Proc. of WETICE 2010 pp. 12-16.
    • (2010) Proc. of WETICE , pp. 12-16
    • Pangalos, G.1    Iliodis, C.2    Pagkalos, I.3
  • 42
    • 79955849415 scopus 로고    scopus 로고
    • Privacy models and languages: Assurance checking policies
    • S.Pearson, "Privacy Models and Languages: Assurance Checking Policies," in Digital Privacy, LNCS 6545, pp. 363-375, 2011.
    • (2011) Digital Privacy, LNCS 6545 , pp. 363-375
    • Pearson, S.1
  • 43
    • 84869219608 scopus 로고    scopus 로고
    • A conceptual model for digital forensic readiness
    • A. Pooe, L.Labuschagne, "A Conceptual Model for Digital Forensic Readiness," in Proc. of ISSA 2012, pp. 1-8.
    • (2012) Proc. of ISSA , pp. 1-8
    • Pooe, A.1    Labuschagne, L.2
  • 44
    • 84943538687 scopus 로고    scopus 로고
    • A forensic framework for handling information privacy incidents
    • Orlando, Florida, USA
    • K.Reddy and H.Venter, " A Forensic Framework for Handling Information Privacy Incidents," in IFIP WG 11.9 International Conference on Digital Forensics, pp. 143-159, Orlando, Florida, USA, 2009.
    • (2009) IFIP WG 11.9 International Conference on Digital Forensics , pp. 143-159
    • Reddy, K.1    Venter, H.2
  • 45
    • 84855646451 scopus 로고    scopus 로고
    • Privacy preserving multiple keyword search for confidential investigation of remote forensics
    • S.Hou, T.Uehara, S.M.Yiu, L.C.K.Hui, K.P.Chow, "Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics ", in Proc. of MINES 2011, pp. 595-599.
    • (2011) Proc. of MINES , pp. 595-599
    • Hou, S.1    Uehara, T.2    Yiu, S.M.3    Hui, L.C.K.4    Chow, K.P.5
  • 46
    • 35448997405 scopus 로고    scopus 로고
    • Threats to privacy in the forensic analysis of database systems
    • Beijing, China
    • P.Stahlberg, G.Miklau,and B.NeilLevine, "Threats to Privacy in the Forensic Analysis of Database Systems," in the SIGMOD 2007, Beijing, China, 2007.
    • (2007) The SIGMOD 2007
    • Stahlberg, P.1    Miklau, G.2    Neillevine, B.3
  • 47
    • 49049112899 scopus 로고    scopus 로고
    • Detecting suspicious relational database queries
    • Barcelona, Spain
    • S.Böttcher, R.Hartel, M.Kirschner, "Detecting Suspicious Relational Database Queries," in the ARES 2008, Barcelona, Spain, 2008.
    • (2008) The ARES 2008
    • Böttcher, S.1    Hartel, R.2    Kirschner, M.3
  • 48
    • 78449264295 scopus 로고    scopus 로고
    • Sequenced release of privacy-accurate information in a forensic investigation
    • N.J.Croft, M.S.Olivier, "Sequenced release of privacy-accurate information in a forensic investigation," in Digital Investigation, Vol.1, Issue 2, 2010.
    • (2010) Digital Investigation , vol.1 , Issue.2
    • Croft, N.J.1    Olivier, M.S.2
  • 49
    • 83455164517 scopus 로고    scopus 로고
    • Privacy preserving confidential forensic investigation for shared or remote servers
    • S.Hou, T. Uehara, S.M. Yiu, L.C.K.Hui, K.P.Chow, "Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers," in Proc. of IIHMSP 2011, pp.378-383.
    • (2011) Proc. of IIHMSP , pp. 378-383
    • Hou, S.1    Uehara, T.2    Yiu, S.M.3    Hui, L.C.K.4    Chow, K.P.5
  • 50
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • Article 14
    • B.C.M.Fung, K.Wang,R.Chen, P.S.Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," in ACM Computing Surveys, Vol.42, No.4, Article 14, 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 51
    • 84885891567 scopus 로고    scopus 로고
    • An efficient searchable encryption scheme and its application in network forensics
    • X. Lin, R.Lu, K.Foxton,X.Shen, "An Efficient Searchable Encryption Scheme and Its Application in Network Forensics," in Proc. of E-Forensics 2010, LNICST 56, pp. 66-78,2011.
    • (2011) Proc. of E-Forensics 2010, LNICST , vol.56 , pp. 66-78
    • Lin, X.1    Lu, R.2    Foxton, K.3    Shen, X.4
  • 52
    • 79961039951 scopus 로고    scopus 로고
    • Privacy-preserving network flow recording
    • Bilal Shebaro, Jedidiah R. Crandall, " Privacy-preserving network flow recording," in Digital Investigation Journal, Issue 8, doi:10.1016/j.diin.2011.05.011, 2011.
    • (2011) Digital Investigation Journal , Issue.8
    • Shebaro, B.1    Crandall, J.R.2
  • 53
    • 84910071642 scopus 로고    scopus 로고
    • A kind of privacy-preserving data mining algorithm oriented to data user
    • AISC 129
    • L.Cai, J.Y.Su, "A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User," in Advances in MSEC, Vol. 2. AISC 129, pp. 25-30, 2011.
    • (2011) Advances in MSEC , vol.2 , pp. 25-30
    • Cai, L.1    Su, J.Y.2
  • 54
    • 80455173555 scopus 로고    scopus 로고
    • Optimized two party privacy preserving association rule mining using fully homomorphic encryption
    • M.G.Koasar, R.Paulet, X.Yi, "Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption," in Proc. of ICA3PP 2011, pp. 360-370, 2011.
    • (2011) Proc. of ICA3PP 2011 , pp. 360-370
    • Koasar, M.G.1    Paulet, R.2    Yi, X.3
  • 55
    • 78650181766 scopus 로고    scopus 로고
    • Efficient generalized selective private function evaluation with applications in biometric authentication
    • H. Lipmaa, B.Zhang, "Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication," in Proc. of Inscrypt 2010, pp.154-16.
    • (2010) Proc. of Inscrypt , pp. 154-216
    • Lipmaa, H.1    Zhang, B.2
  • 56
    • 80051555814 scopus 로고    scopus 로고
    • Privacy preserving keyword search over encrypted cloud data
    • S.Anathi, M.S.Sendil, S.Karthik, "Privacy Preserving Keyword Search over Encrypted Cloud Data," in Proc. of ACC 2011, pp. 480-487.
    • (2011) Proc. of ACC , pp. 480-487
    • Anathi, S.1    Sendil, M.S.2    Karthik, S.3
  • 57
    • 3843098978 scopus 로고    scopus 로고
    • (2000/C364/01),. Accessed on 13th Feb 2014
    • Charter of Fundamental Rights of the European Union 2000 (2000/C364/01),Available:http://www.europarl.europa.eu/charte r/pdf/text-en.pdf. Accessed on 13th Feb 2014.
    • (2000) Charter of Fundamental Rights of the European Union
  • 58
    • 84859028488 scopus 로고    scopus 로고
    • Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications
    • Rachel L. Finn, David Wright, "Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications" in Computer Law &Security Review Vol. 28, 2012, pp.184-194
    • (2012) Computer Law &Security Review , vol.28 , pp. 184-194
    • Finn, R.L.1    Wright, D.2
  • 59
    • 84910084038 scopus 로고    scopus 로고
    • Protecting privacy in china-chapter 4: The legal protection of privacy in international practices: Potential as models for a chinese privacy protection regimen
    • Springer-Verlag Berlin Heidelberg
    • H. Wang, "Protecting Privacy in China-Chapter 4: The Legal Protection of Privacy in International Practices: Potential as Models for a Chinese Privacy Protection Regimen," in International Standards, Springer-Verlag Berlin Heidelberg 2011.
    • (2011) International Standards
    • Wang, H.1
  • 60
    • 84885380116 scopus 로고    scopus 로고
    • There's more to it than data protection-Fundamental rights, privacy and the personal/household exemption in the digital age
    • Z.Warso, " There's more to it than data protection-Fundamental rights, privacy and the personal/household exemption in the digital age," in Computer Law &Security Review, Vol.29, pp. 676-688, 2013.
    • (2013) Computer Law &Security Review , vol.29 , pp. 676-688
    • Warso, Z.1
  • 61
    • 84910104741 scopus 로고    scopus 로고
    • Safe Harbor Agreement 2000. Accessed on 13 Feb
    • Safe Harbor Agreement 2000, Available at: http://export.gov/safeharbor/eu/eg-main-018476.asp. Accessed on 13 Feb 2014.
    • (2014)
  • 63
    • 84859050184 scopus 로고    scopus 로고
    • Comment: We've got our eyes on you: When surveillance by unmanned aircraft systems constitutes a Fourth amendment search
    • Dunlap Travis, "Comment: we've got our eyes on you: when surveillance by unmanned aircraft systems constitutes a Fourth amendment search," in South Texas Law Review Fall 2009; Vol. 51, Issue 1.
    • (2009) South Texas Law Review Fall , vol.51 , Issue.1
    • Travis, D.1
  • 64
    • 84892755097 scopus 로고    scopus 로고
    • Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations
    • McBride Paul, "Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations," in Journal of Air Law and Commerce Summer 2009; Vol.74, Issue 3, pp. 627-628.
    • (2009) Journal of Air Law and Commerce Summer , vol.74 , Issue.3 , pp. 627-628
    • McBride, P.1
  • 65
    • 59049095530 scopus 로고    scopus 로고
    • APEC's privacy framework: A new low standard
    • G. Greenleaf, "APEC's privacy framework: a new low standard," in Privacy Law and Policy Reporter, Vol.11, issue 5, 2005.
    • (2005) Privacy Law and Policy Reporter , vol.11 , Issue.5
    • Greenleaf, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.