-
1
-
-
79960257802
-
Cryptography goes to the cloud
-
In Proceedings of the STA Workshops: IWCS and STAVE on Secure and Trust Computing, Data Management, and Applications, Loutraki, Greece
-
Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., & Lambrinoudakis, C. (2011). Cryptography goes to the cloud. In Proceedings of the STA Workshops: IWCS and STAVE on Secure and Trust Computing, Data Management, and Applications, Loutraki, Greece (Vol. 187).
-
(2011)
, vol.187
-
-
Agudo, I.1
Nuñez, D.2
Giammatteo, G.3
Rizomiliotis, P.4
Lambrinoudakis, C.5
-
2
-
-
84871176517
-
Zeus BotNet Controller
-
Retrieved February 2, 2012
-
Amazon Web Services. (2009). Zeus BotNet Controller. Amazon Security Bulletin. Retrieved February 2, 2012, from http://aws.amazon.com/security/security-bulletins/zeus-botnet-controller/
-
(2009)
Amazon Security Bulletin
-
-
-
3
-
-
84944032202
-
Amazon Cloud- Front - Developer Guide
-
Retrieved February 2, 2012
-
Amazon Web Services. (2010). Amazon Cloud- Front - Developer Guide. Retrieved February 2, 2012, from http://s3.amazonaws.com/awsdocs/CF/latest/cf_dg.pdf
-
(2010)
-
-
-
4
-
-
33745186968
-
Good practice guide for computer-based electronic evidence
-
February 2, 2012
-
Association of Chief Police Officers, & 7Safe. (2007). Good practice guide for computer-based electronic evidence. Retrieved February 2, 2012, from http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf
-
(2007)
-
-
-
5
-
-
84925266018
-
The enhanced digital investigation process. Paper presented at the Digital Forensic Research Workshop
-
Baltimore, MD.
-
Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process. Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
-
(2004)
-
-
Baryamureeba, V.1
Tushabe, F.2
-
6
-
-
79955971286
-
DepSky: Dependable and secure storage in a cloud-of-clouds
-
Salzburg, Austria
-
Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2011). DepSky: Dependable and secure storage in a cloud-of-clouds. In Proceedings of the Sixth Conference on Computer Systems, Salzburg, Austria (pp. 31-46).
-
(2011)
Proceedings of the Sixth Conference on Computer Systems
, pp. 31-46
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
8
-
-
84870279159
-
Cloud computing storms
-
Biggs, S., & Vidalis, S. (2010). Cloud computing storms. International Journal of Intelligent Computing Research, 1(1), 63-72.
-
(2010)
International Journal of Intelligent Computing Research,
, vol.1
, Issue.1
, pp. 63-72
-
-
Biggs, S.1
Vidalis, S.2
-
9
-
-
77950653648
-
Hide and seek in the cloud
-
Blumenthal, M. S. (2010). Hide and seek in the cloud. IEEE Security & Privacy, 8(2), 57-58. doi:10.1109/MSP.2010.70.
-
(2010)
IEEE Security & Privacy,
, vol.8
, Issue.2
, pp. 57-58
-
-
Blumenthal, M.S.1
-
10
-
-
84871134713
-
Cloud computing: eDiscovery issues and other risk
-
February 2, 2012
-
Butler, C. W., Heckman, C., & Thorp, A. (2010). Cloud computing: eDiscovery issues and other risk. Retrieved February 2, 2012, from http://www.orrick.com/fileupload/2740.pdf
-
(2010)
-
-
Butler, C.W.1
Heckman, C.2
Thorp, A.3
-
12
-
-
63149105878
-
An eventbased digital forensic investigation framework
-
Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
-
Carrier, B., & Spafford, E. H. (2004). An eventbased digital forensic investigation framework. Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
-
(2004)
-
-
Carrier, B.1
Spafford, E.H.2
-
13
-
-
80053156184
-
The cost of cyber crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office
-
February 2, 2012
-
Detica. (2011, February). The cost of cyber crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Retrieved February 2, 2012, from http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crimefull-report.pdf
-
(2011)
-
-
-
14
-
-
84944040573
-
Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Official Journal of the European Union
-
Retrieved February 2, 2012
-
European Union. (2006). Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Official Journal of the European Union, 15(4). Retrieved February 2, 2012, from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF
-
(2006)
, vol.15
, Issue.4
-
-
-
15
-
-
84455197882
-
IDC Predictions 2011: Welcome to the New Mainstream (International Data Corporation White Paper, Doc No. 225878)
-
February 2, 2012
-
Gens, F. (2010). IDC Predictions 2011: Welcome to the New Mainstream (International Data Corporation White Paper, Doc No. 225878). Retrieved February 2, 2012, from http://www.idc.com/research/viewdocsynopsis.jsp?containerId=225878
-
(2010)
-
-
Gens, F.1
-
16
-
-
21644437974
-
The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Bolton Landing, NY.
-
Ghemawat, S., Gobioff, H., & Leung, S. T. (2003). The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY.
-
(2003)
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.T.3
-
17
-
-
84871179314
-
Google apps messaging and collaboration products
-
2, 2012
-
Google. (2010). Google apps messaging and collaboration products. Retrieved February 2, 2012, from http://static.googleusercontent.com/external_content/untrusted_dlcp/www.google. com/en//a/help/intl/en-GB/admins/pdf/ds_gsa_ apps_whitepaper_0207.pdf
-
(2010)
-
-
-
18
-
-
84871127804
-
Message security for Google Apps: Administration guide
-
Retrieved February 2, 2012
-
Google. (2011). Message security for Google Apps: Administration guide. Retrieved February 2, 2012, from https://ac-s9.postini.com/help/ admin_msd/administration_msd.pdf
-
(2011)
-
-
-
19
-
-
84871161943
-
Web-based email, calendar, and documents for teams
-
Retrieved February 2, 2012
-
Google Apps. (2011). Web-based email, calendar, and documents for teams. Retrieved February 2, 2012, from http://www.google.com/apps/intl/en/business/index.html
-
(2011)
-
-
-
20
-
-
68949135999
-
Validation and verification of computer forensic software tools-Searching function
-
Guo, Y., Slay, J., & Beckett, J. (2009). Validation and verification of computer forensic software tools-Searching function. Digital Investigation, 6, 12-22. doi:10.1016/j.diin.2009.06.015.
-
(2009)
Digital Investigation,
, vol.6
, pp. 12-22
-
-
Guo, Y.1
Slay, J.2
Beckett, J.3
-
21
-
-
79551525376
-
The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation
-
Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Report, 27(1), 61-67. doi:10.1016/j.clsr.2010.11.001.
-
(2011)
Computer Law & Security Report,
, vol.27
, Issue.1
, pp. 61-67
-
-
Hunton, P.1
-
22
-
-
33746255206
-
FORZA - Digital forensics investigation framework that incorporate legal issues
-
Ieong, R. S. C. (2006). FORZA - Digital forensics investigation framework that incorporate legal issues. Digital Investigation, 3, 29-36. doi:10.1016/j.diin.2006.06.004.
-
(2006)
Digital Investigation,
, vol.3
, pp. 29-36
-
-
Ieong, R.S.C.1
-
23
-
-
77956137294
-
Cryptographic cloud storage
-
Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. In Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, Tenerife, Canary Islands, Spain (pp. 136-149).
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, Tenerife, Canary Islands, Spain
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
24
-
-
84871158912
-
SMB cloud adoption study Dec 2010 - Global Report: What will be the impact of cloud services on SMBs in the next 3 years?
-
Retrieved February 2, 2012
-
Kazarian, B., & Hanlon, B. (2011). SMB cloud adoption study Dec 2010 - Global Report: What will be the impact of cloud services on SMBs in the next 3 years? Retrieved February 2, 2012, from http://www.microsoft.com/Presspass/presskits/commsector/docs/SMBStudy_032011.pdf
-
(2011)
-
-
Kazarian, B.1
Hanlon, B.2
-
25
-
-
77957969479
-
Cloud migration: A case study of migrating an enterprise IT system to IaaS
-
Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2010). Cloud migration: A case study of migrating an enterprise IT system to IaaS. In Proceedings of the IEEE International Conference on Cloud Computing, Miami, FL (pp. 450-457).
-
(2010)
Proceedings of the IEEE International Conference on Cloud Computing, Miami, FL
, pp. 450-457
-
-
Khajeh-Hosseini, A.1
Greenwood, D.2
Sommerville, I.3
-
26
-
-
0038027865
-
Computer forensics: Incident response essentials
-
Reading, MS: Addison-Wesley
-
Kruse, I., Warren, G., & Jay, G. (2001). Computer forensics: Incident response essentials. Reading, MS: Addison-Wesley.
-
(2001)
-
-
Kruse, I.1
Warren, G.2
Jay, G.3
-
27
-
-
79960511333
-
Cloud security - A comprehensive guide to secure cloud computing
-
New York, NY: John Wiley & Sons
-
Krutz, R. R., & Vines, R. (2010). Cloud security - A comprehensive guide to secure cloud computing. New York, NY: John Wiley & Sons.
-
(2010)
-
-
Krutz, R.R.1
Vines, R.2
-
28
-
-
84944058712
-
Computer Evidence v
-
Daubert: The coming conflict. West Lafayette, IN USA: Purdue University, Center for Education and Research in Information Assurance and Security
-
Marsico, C. V. (2004). Computer Evidence v. Daubert: The coming conflict. West Lafayette, IN USA: Purdue University, Center for Education and Research in Information Assurance and Security.
-
(2004)
-
-
Marsico, C.V.1
-
29
-
-
79959322079
-
Cloud application logging for forensics. In Proceedings of the ACM Symposium on Applied Computing
-
Marty, R. (2011). Cloud application logging for forensics. In Proceedings of the ACM Symposium on Applied Computing, TaiChung, Taiwan (pp. 178-184).
-
(2011)
TaiChung, Taiwan
, pp. 178-184
-
-
Marty, R.1
-
30
-
-
77954051808
-
The NIST definition of cloud computing. Cambridge, MA: National Institute of Standards and Technology
-
Retrieved February 2, 2012
-
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Cambridge, MA: National Institute of Standards and Technology. Retrieved February 2, 2012, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
-
(2011)
-
-
Mell, P.1
Grance, T.2
-
31
-
-
82455175178
-
An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines
-
Owen, P., & Thomas, P. (2011). An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines. Digital Investigation, 8(2), 135-140. doi:10.1016/j.diin.2011.03.002.
-
(2011)
Digital Investigation,
, vol.8
, Issue.2
, pp. 135-140
-
-
Owen, P.1
Thomas, P.2
-
32
-
-
0038027863
-
A road map for digital forensic research - Report from the First Digital Forensic Research Workshop (DFRWS)
-
Utica, NY: Digital Forensic Research Workshop
-
Palmer, G. (2001). A road map for digital forensic research - Report from the First Digital Forensic Research Workshop (DFRWS). Utica, NY: Digital Forensic Research Workshop.
-
(2001)
-
-
Palmer, G.1
-
33
-
-
84883551624
-
Digital triage forensics: Processing the digital crime scene
-
Burlington, MA: Syngress
-
Pearson, S., & Watson, R. (2010). Digital triage forensics: Processing the digital crime scene. Burlington, MA: Syngress.
-
(2010)
-
-
Pearson, S.1
Watson, R.2
-
34
-
-
84869161782
-
Forecast: Public cloud services, worldwide and regions, industry sectors, 2009-2014
-
Stamford, CT: Gartner, Retrieved February 2, 2012
-
Pring, B., Brown, R. H., Leong, L., Biscotti, F., Couture, A. W., & Lheureux, B. J.Liu, V. K. (2010). Forecast: Public cloud services, worldwide and regions, industry sectors, 2009-2014.Stamford, CT: Gartner. Retrieved February 2, 2012, from http://www.gartner.com/id=1378513
-
(2010)
-
-
Pring, B.1
Brown, R.H.2
Leong, L.3
Biscotti, F.4
Couture, A.W.5
Lheureux, B.J.6
Liu, V.K.7
-
35
-
-
79951489100
-
Cloud computing: Forensic challenges for law enforcement
-
Reilly, D., Wren, C., & Berry, T. (2010). Cloud computing: Forensic challenges for law enforcement. In Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, London, UK (pp. 1-7).
-
(2010)
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, London, UK
, pp. 1-7
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
36
-
-
1242273312
-
An examination of digital forensic models
-
Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence, 1(3).
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.3
-
-
Reith, M.1
Carr, C.2
Gunsch, G.3
-
37
-
-
85032527873
-
Seizure of digital information
-
Reyes, A., O'Shea, K., Steele, J., Hansen, J. R., Jean, B. R., & Ralph, T. (Eds.), Burlington, MA: Syngress
-
Reyes, A., O'Shea, K., Steele, J., Hansen, J. R., Jean, B. R., & Ralph, T. (2007). Seizure of digital information. In Reyes, A., O'Shea, K., Steele, J., Hansen, J. R., Jean, B. R., & Ralph, T. (Eds.), Cyber crime investigations: Bridging the gap between security professionals, law enforcement, and prosecutors. Burlington, MA: Syngress.
-
(2007)
Cyber crime investigations: Bridging the gap between security professionals, law enforcement, and prosecutors
-
-
Reyes, A.1
O'Shea, K.2
Steele, J.3
Hansen, J.R.4
Jean, B.R.5
Ralph, T.6
-
38
-
-
33745203008
-
Next-generation digital forensics
-
Richard, G., & Roussev, V. (2006). Next-generation digital forensics. Communications of the ACM, 49(2), 76-80. doi:10.1145/1113034.1113074.
-
(2006)
Communications of the ACM,
, vol.49
, Issue.2
, pp. 76-80
-
-
Richard, G.1
Roussev, V.2
-
39
-
-
50849087527
-
Computer forensics field triage process model
-
Rogers, M. K., Goldman, J., Mislan, R., & Wedge, T. (2006). Computer forensics field triage process model. Journal of Digital Forensics, Security and Law, 1(2).
-
(2006)
Journal of Digital Forensics, Security and Law
, vol.1
, Issue.2
-
-
Rogers, M.K.1
Goldman, J.2
Mislan, R.3
Wedge, T.4
-
40
-
-
77950559014
-
Intrusion detection in the cloud. In Proceedings of the Eighth IEEE International Conference on Dependable
-
Roschke, S., Cheng, F., & Meinel, C. (2009). Intrusion detection in the cloud. In Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China (pp. 729-734).
-
(2009)
Autonomic and Secure Computing, Chengdu, China
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
41
-
-
84943543512
-
A cloud computing platform for largescale forensic computi
-
Roussev, V., Wang, L., Richard, G., & Marziale, L. (2009). A cloud computing platform for largescale forensic computing. In Proceedings of the 5th IFIP WG 11.9 International Conference on Advances in Digital Forensics V, Orlando, FL (Vol. 306, pp. 201-214).
-
(2009)
In Proceedings of the 5th IFIP WG 11.9 International Conference on Advances in Digital Forensics V, Orlando, FL (Vol.
, vol.306
, pp. 201-214
-
-
Roussev, V.1
Wang, L.2
Richard, G.3
Marziale, L.4
-
42
-
-
85032558983
-
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In Proceedings of the 6th Annual Conference of the ADFSL Conference on Digital Forensics
-
Ruan, K., Baggili, I., Carthy, J., & Kechadi, T. (2011). Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In Proceedings of the 6th Annual Conference of the ADFSL Conference on Digital Forensics, Security and Law, Richmond, VA.
-
(2011)
Security and Law, Richmond, VA.
-
-
Ruan, K.1
Baggili, I.2
Carthy, J.3
Kechadi, T.4
-
43
-
-
85032526271
-
Cloud forensi
-
Ruan, K., Carthy, J., Kechadi, T., & Crosbie, M. (2011). Cloud forensics. In Proceedings of the 7th IFIP WG 11.9 International Conference on Advances in Digital Forensics VII, Orlando, FL. Salgado, R. P. (2005). Fourth amendment search and the power of the hash. Harvard Law Review, 119(38), 38-46.
-
(2011)
In Proceedings of the 7th IFIP WG 11.9 International Conference on Advances in Digital Forensics VII, Orlando, FL. Salgado, R. P. (2005). Fourth amendment search and the power of the hash. Harvard Law Review,
, vol.119
, Issue.38
, pp. 38-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
44
-
-
84944059724
-
The future of cloud computing: Opportunities for European cloud computing beyond 2010. European Commission Information and Society Theme - Expert Group Report
-
February 2, 2012
-
Schubert, L., Jeffery, K., & Neidecker-Lutz, B. (2010). The future of cloud computing: Opportunities for European cloud computing beyond 2010. European Commission Information and Society Theme - Expert Group Report. Retrieved February 2, 2012, from http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf
-
(2010)
-
-
Schubert, L.1
Jeffery, K.2
Neidecker-Lutz, B.3
-
45
-
-
3042731402
-
The challenges of large computer evidence cases
-
Sommer, P. (2004). The challenges of large computer evidence cases. Digital Investigation, 1(1), 16-17. doi:10.1016/j.diin.2004.01.005.
-
(2004)
Digital Investigation,
, vol.1
, Issue.1
, pp. 16-17
-
-
Sommer, P.1
-
47
-
-
77955574175
-
Digital evidence in cloud computing systems
-
Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Report, 26(3), 304-308. doi:10.1016/j.clsr.2010.03.002.
-
(2010)
Computer Law & Security Report,
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
48
-
-
84977625579
-
The admissibility of expert evidence in criminal proceedings in England and Wales - A new approach to the determination of evidentiary reliability (Consultation Paper No. 190)
-
Retrieved February 2, 2012
-
The Law Commission. (2009). The admissibility of expert evidence in criminal proceedings in England and Wales - A new approach to the determination of evidentiary reliability (Consultation Paper No. 190). Retrieved February 2, 2012, from http://www.justice.gov.uk/lawcommission/ docs/cp190_Expert_Evidence:Consultation.pdf
-
(2009)
-
-
-
49
-
-
77957962695
-
Open Cloud manifesto
-
Retrieved February 2, 2012
-
The Open Cloud Manifesto Consortium. (2009). Open Cloud manifesto. Retrieved February 2, 2012, from http://www.opencloudmanifesto.org/ Open%20Cloud%20Manifesto.pdf
-
(2009)
-
-
-
50
-
-
19844366707
-
Computer forensics: Computer crime scene investigation
-
(2nd ed.). Hingham, MA: Charles River Media.
-
Vacca, J. R. (2005). Computer forensics: Computer crime scene investigation (2nd ed.). Hingham, MA: Charles River Media.
-
(2005)
-
-
Vacca, J.R.1
-
51
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
Vieira, K., Schulter, A., Westphall, C., & Westphall, C. (2010). Intrusion detection for grid and cloud computing. IT Professional, 12(4), 38-43. doi:10.1109/MITP.2009.89.
-
(2010)
IT Professional,
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
52
-
-
78651078141
-
Using a local search warrant to acquire evidence stored overseas via the Internet
-
Proceedings of the 6th IFIP WG 11.9 International Conference on Advances in Digital Forensics VI, Hong Kong
-
Wang, K. (2010). Using a local search warrant to acquire evidence stored overseas via the Internet. In Proceedings of the 6th IFIP WG 11.9 International Conference on Advances in Digital Forensics VI, Hong Kong (pp. 37-48).
-
(2010)
, pp. 37-48
-
-
Wang, K.1
-
53
-
-
84979802564
-
Foundations of computer forensics: A technology for the fight against computer crime
-
Wang, Y., Cannady, J., & Rosenbluth, J. (2005). Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report, 21(2), 119-127. doi:10.1016/j.clsr.2005.02.007.
-
(2005)
Computer Law & Security Report,
, vol.21
, Issue.2
, pp. 119-127
-
-
Wang, Y.1
Cannady, J.2
Rosenbluth, J.3
-
54
-
-
84871136555
-
Amazon EC2 now available in Europe
-
Retrieved February 2, 2012
-
Wauters, R. (2008). Amazon EC2 now available in Europe. Retrieved February 2, 2012, from http:// techcrunch.com/2008/12/10/amazon-ec2-nowavailable- in-europe/
-
(2008)
-
-
Wauters, R.1
|