-
1
-
-
84938064472
-
-
Department of Electrical and Computer Engineering and Information Assurance Center Iowa State University December
-
G. Yong Ph.D, "Digital forensics: Research challenges and open problems," in Department of Electrical and Computer Engineering and Information Assurance Center Iowa State University, December 2007.
-
(2007)
Digital Forensics: Research Challenges and Open Problems
-
-
Yong, G.1
-
2
-
-
84913621636
-
Technical issues of forensic investigations in cloud computing environments
-
Horst Goertz Institute for IT Security Bochum, Germany, January 2011
-
D. Birk and C. Wegener, "Technical issues of forensic investigations in cloud computing environments," in Ruhr-University Bochum, Horst Goertz Institute for IT Security Bochum, Germany, January 2011.
-
Ruhr-University Bochum
-
-
Birk, D.1
Wegener, C.2
-
4
-
-
84863088193
-
Cloud computing -concepts, architecture and challenges
-
March
-
Y. Jadeja and K. Modi, "Cloud computing -concepts, architecture and challenges," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, pp. 877 -880, March 2012.
-
(2012)
Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
, pp. 877-880
-
-
Jadeja, Y.1
Modi, K.2
-
6
-
-
84890845543
-
Isolating a cloud instance for a digital forensic investigation
-
Johannesburg, South-Africa, August
-
W. Delport, M. Kohn, and M. S. Olivier, "Isolating a cloud instance for a digital forensic investigation," in Proceedings of the 2011 Information Security South Africa (ISSA 2011) Conference, Johannesburg, South-Africa, August 2011.
-
(2011)
Proceedings of the 2011 Information Security South Africa (ISSA 2011) Conference
-
-
Delport, W.1
Kohn, M.2
Olivier, M.S.3
-
7
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
R. Lu, X. Lin, X. Liang, and X. S. Shen, "Secure provenance: the essential of bread and butter of data forensics in cloud computing," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010, pp. 282-292.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.S.4
-
10
-
-
78650399565
-
Provenance as first class cloud data
-
K.-K. Muniswamy-Reddy and M. Seltzer, "Provenance as first class cloud data," ACM SIGOPS Operating Systems Review, vol. 43, no. 4, pp. 11-16, 2010.
-
(2010)
ACM SIGOPS Operating Systems Review
, vol.43
, Issue.4
, pp. 11-16
-
-
Muniswamy-Reddy, K.-K.1
Seltzer, M.2
-
11
-
-
78649514344
-
A new data integrity verification mechanism for saas
-
Springer
-
Y. Shi, K. Zhang, and Q. Li, "A new data integrity verification mechanism for saas," in Web Information Systems and Mining. Springer, 2010, pp. 236-243.
-
(2010)
Web Information Systems and Mining
, pp. 236-243
-
-
Shi, Y.1
Zhang, K.2
Li, Q.3
-
13
-
-
51149093303
-
Forensic web services
-
Springer
-
M. Gunestas, D. Wijesekera, and A. Singhal, "Forensic web services," in Advances in Digital Forensics IV. Springer, 2008, pp. 163-176.
-
(2008)
Advances in Digital Forensics IV
, pp. 163-176
-
-
Gunestas, M.1
Wijesekera, D.2
Singhal, A.3
-
14
-
-
37149007674
-
Full-domain subgroup hiding and constantsize group signatures
-
Springer
-
X. Boyen and B. Waters, "Full-domain subgroup hiding and constantsize group signatures," in Public Key Cryptography-PKC 2007. Springer, 2007, pp. 1-15.
-
(2007)
Public Key Cryptography-PKC
, vol.2007
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
15
-
-
85029476360
-
Layering in provenance systems
-
K.-K. Muniswamy-Reddy, U. Braun, D. A. Holland, P. Macko, D. Maclean, D. Margo, M. Seltzer, and R. Smogor, "Layering in provenance systems," in Proceedings of the 2009 USENIX Annual Technical Conference, 2009.
-
(2009)
Proceedings of the 2009 USENIX Annual Technical Conference
-
-
Muniswamy-Reddy, K.-K.1
Braun, U.2
Holland, D.A.3
Macko, P.4
Maclean, D.5
Margo, D.6
Seltzer, M.7
Smogor, R.8
-
16
-
-
0019009078
-
Osi reference model-The iso model of architecture for open systems interconnection
-
H. Zimmermann, "Osi reference model-the iso model of architecture for open systems interconnection," Communications, IEEE Transactions on, vol. 28, no. 4, pp. 425-432, 1980.
-
(1980)
Communications IEEE Transactions on
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmermann, H.1
-
18
-
-
0020588929
-
X 25 and related recommendations in ibm products
-
G. A. Deaton Jr and R. O. Hippert Jr, "X. 25 and related recommendations in ibm products," IBM systems journal, vol. 22, no. 1.2, pp. 11-29, 1983.
-
(1983)
IBM Systems Journal
, vol.22
, Issue.12
, pp. 11-29
-
-
Deaton, G.A.1
Hippert, R.O.2
-
20
-
-
84890819466
-
Cloud computing: Another digital forensic challenge
-
October
-
J. J. Barbara, "Cloud computing: Another digital forensic challenge," Digital Forensic Investigator News, October 2009.
-
(2009)
Digital Forensic Investigator News
-
-
Barbara, J.J.1
-
22
-
-
31444447880
-
A survey of data provenance techniques
-
Bloomington IN
-
Y. L. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance techniques," Computer Science Department, Indiana University, Bloomington IN, vol. 47405, 2005.
-
(2005)
Computer Science Department, Indiana University
, pp. 47405
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
23
-
-
35048864354
-
Using semantic web technologies for representing e-science provenance
-
Springer
-
J. Zhao, C. Wroe, C. Goble, R. Stevens, D. Quan, and M. Greenwood, "Using semantic web technologies for representing e-science provenance," in The Semantic Web-ISWC 2004. Springer, 2004, pp. 92-106.
-
(2004)
The Semantic Web-ISWC 2004
, pp. 92-106
-
-
Zhao, J.1
Wroe, C.2
Goble, C.3
Stevens, R.4
Quan, D.5
Greenwood, M.6
-
25
-
-
84913608618
-
Definition of the flexible image transport system (fits
-
R. Hanisch, A. Farris, E. Greisen, W. Pence, B. Schlesinger, P. Teuben, R. Thompson, and A. Warnock, "Definition of the flexible image transport system (fits)," Astronomy and Astrophysics, 2000.
-
(2000)
Astronomy and Astrophysics
-
-
Hanisch, R.1
Farris, A.2
Greisen, E.3
Pence, W.4
Schlesinger, B.5
Teuben, P.6
Thompson, R.7
Warnock, A.8
-
26
-
-
84913622615
-
Spatial data transfer standard (sdts
-
Springer
-
P. Altheide, "Spatial data transfer standard (sdts)," in Encyclopedia of GIS. Springer, 2008, pp. 1087-1095.
-
(2008)
Encyclopedia of GIS
, pp. 1087-1095
-
-
Altheide, P.1
|