-
3
-
-
84901446600
-
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
-
A. Gani, G. M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan. 2014. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Network Comput. Appl. 43 (2014), 84-102.
-
(2014)
J. Network Comput. Appl.
, vol.43
, Issue.2014
, pp. 84-102
-
-
Gani, A.1
Nayeem, G.M.2
Shiraz, M.3
Sookhak, M.4
Whaiduzzaman, M.5
Khan, S.6
-
5
-
-
84863395085
-
Advances and challenges in log analysis
-
2012
-
A. Oliner, A. Ganapathi, and W. Xu. 2012. Advances and challenges in log analysis. Commun. ACM 55, 2 (2012), 55-61.
-
(2012)
Commun. ACM
, vol.55
, Issue.2
, pp. 55-61
-
-
Oliner, A.1
Ganapathi, A.2
Xu, W.3
-
7
-
-
84928256466
-
Logging for cloud computing forensic systems
-
2015
-
A. Patrascu and V. V. Patriciu. 2015. Logging for cloud computing forensic systems. Int. J. Comput. Commun. Control 10, 2 (2015), 222-229.
-
(2015)
Int. J. Comput. Commun. Control
, vol.10
, Issue.2
, pp. 222-229
-
-
Patrascu, A.1
Patriciu, V.V.2
-
8
-
-
84971331079
-
Extending access management to maintain audit logs in cloud computing
-
A. Prasad and P. Chakrabarti. 2014. Extending access management to maintain audit logs in cloud computing. Int. J. Adv. Comput. Sci. Appl. 5, 3 (2014), 144-147.
-
(2014)
Int. J. Adv. Comput. Sci. Appl.
, vol.5
, Issue.3
, pp. 144-147
-
-
Prasad, A.1
Chakrabarti, P.2
-
9
-
-
84875384473
-
Secure log architecture to support remote auditing
-
2013
-
A. Rafael. 2013. Secure log architecture to support remote auditing. Math. Comput. Model. 57, 7 (2013), 1578-1591.
-
(2013)
Math. Comput. Model.
, vol.57
, Issue.7
, pp. 1578-1591
-
-
Rafael, A.1
-
12
-
-
84971331083
-
-
Amazon., 2015. Retrieved November 16, 2015, from
-
Amazon. 2015. Amazon Simple Notification Service. (2015). Retrieved November 16, 2015, from http://aws.amazon.com/sns/.
-
(2015)
Amazon Simple Notification Service
-
-
-
15
-
-
33745203225
-
Risks of live digital forensic analysis
-
2006
-
B. R. Carrier. 2006. Risks of live digital forensic analysis. Commun. ACM 49, 2 (2006), 56-61.
-
(2006)
Commun. ACM
, vol.49
, Issue.2
, pp. 56-61
-
-
Carrier, B.R.1
-
16
-
-
84971263048
-
-
U.S. Patent No. 8, 856, 086
-
C. C. Yun, J. Y. C. Chang, B. B. C. Chiu, D. Y. Shue, Y. Kaneyasu, and J.W.Warfield. 2014. Ensuring integrity of security event log upon download and delete. (2014). U.S. Patent No. 8, 856, 086.
-
(2014)
Ensuring Integrity of Security Event Log Upon Download and Delete. (2014)
-
-
Yun, C.C.1
Chang, J.Y.C.2
Chiu, B.B.C.3
Shue, D.Y.4
Kaneyasu, Y.5
Warfield, J.W.6
-
17
-
-
84971288385
-
-
2009, Retrieved November 16, 2015, from
-
C. Oppenheimer. 2009. Loggly reveals what matters. (2009). Retrieved November 16, 2015, from https://www.loggly.com/.
-
(2009)
Loggly Reveals What Matters
-
-
Oppenheimer, C.1
-
18
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
2013
-
C. Rong, S. T. Nguyen, and M. G. Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39, 1 (2013), 47-54.
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
19
-
-
84971208551
-
-
U.S. Patent No. 8, 499, 297, (2013)
-
D. J. Scales, M. Xu, and M. D. Ginzton. 2013. Low overhead fault tolerance through hybrid checkpointing and replay. U.S. Patent No. 8, 499, 297 (2013).
-
(2013)
Low Overhead Fault Tolerance Through Hybrid Checkpointing and Replay
-
-
Scales, D.J.1
Xu, M.2
Ginzton, M.D.3
-
20
-
-
84865625452
-
Technical challenges of forensic investigations in cloud computing environments
-
Zurich, Switzerland
-
D. Birk. 2011. Technical challenges of forensic investigations in cloud computing environments. In Workshop on Cryptography and Security in Clouds. Zurich, Switzerland, 1-6.
-
(2011)
Workshop on Cryptography and Security in Clouds
, pp. 1-6
-
-
Birk, D.1
-
23
-
-
70349593268
-
Gramm-Leach-Bliley act, information privacy, and the limits of default rules
-
E. J. Janger and P.M. Schwartz. 2001. Gramm-Leach-Bliley act, information privacy, and the limits of default rules. The. Minn. L. Rev. 86 (2001), 1219.
-
(2001)
The. Minn. L. Rev.
, vol.86
, pp. 1219
-
-
Janger, E.J.1
Schwartz, P.M.2
-
24
-
-
84971331063
-
-
2014. Retrieved November 16, 2015, from
-
E. Lindvall. 2014. How Papertrail makes life easier. (2014). Retrieved November 16, 2015, from https://papertrailapp.com/.
-
(2014)
How Papertrail Makes Life Easier
-
-
Lindvall, E.1
-
27
-
-
84903642496
-
Multi-tenancy in cloud computing
-
Oxford, United Kingdom
-
H. A. Jahdali, A. Albatli, P. Garraghan, P. Townend, L. Lau, and Jie Xu. 2014. Multi-tenancy in cloud computing. In Proceeding of the IEEE 8th International Symposium on Service Oriented System Engineering. Oxford, United Kingdom, 344-351.
-
(2014)
Proceeding of the IEEE 8th International Symposium on Service Oriented System Engineering
, pp. 344-351
-
-
Jahdali, H.A.1
Albatli, A.2
Garraghan, P.3
Townend, P.4
Lau, L.5
Xu, J.6
-
28
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
H. Chung, J. Park, S. Lee, and C. Kang. 2012. Digital forensic investigation of cloud storage services. Digital Invest. 9, 2 (2012), 81-95.
-
(2012)
Digital Invest.
, vol.9
, Issue.2
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
29
-
-
84901281683
-
MalSpot: Multi2 malicious network behavior patterns analysis
-
Springer, Berlin, 2014
-
H. H. Mao, C. J. Wu, E. E. Papalexakis, C. Faloutsos, K. C. Lee, and T. C. Kao. 2014. MalSpot: Multi2 malicious network behavior patterns analysis. In Advances in Knowledge Discovery and Data Mining. Springer, Berlin, (2014), 1-14.
-
(2014)
Advances in Knowledge Discovery and Data Mining.
, pp. 1-14
-
-
Mao, H.H.1
Wu, C.J.2
Papalexakis, E.E.3
Faloutsos, C.4
Lee, K.C.5
Kao, T.C.6
-
30
-
-
84907325157
-
The rise of "big data" on cloud computing: Review and open research issues
-
I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan. The rise of "big data" on cloud computing: Review and open research issues. Inform. Syst. 47 (2015), 98-115.
-
(2015)
Inform. Syst.
, vol.47
, pp. 98-115
-
-
Hashem, I.A.T.1
Yaqoob, I.2
Anuar, N.B.3
Mokhtar, S.4
Gani, A.5
Khan, S.U.6
-
32
-
-
84876811768
-
Secure logging as a service-delegating log management to the cloud
-
2013
-
I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram. 2013. Secure logging as a service-delegating log management to the cloud. IEEE Syst. J. 7 (2013), 323-334.
-
(2013)
IEEE Syst. J.
, vol.7
, pp. 323-334
-
-
Ray, I.1
Belyaev, K.2
Strizhov, M.3
Mulamba, D.4
Rajaram, M.5
-
33
-
-
84864612252
-
Understanding issues in cloud forensics: Two hypothetical case studies
-
J. Dykstra and A. T. Sherman. 2011. Understanding issues in cloud forensics: Two hypothetical case studies. J. Network Forens. 3, 1 (2011), 19-31.
-
(2011)
J. Network Forens.
, vol.3
, Issue.1
, pp. 19-31
-
-
Dykstra, J.1
Sherman, A.T.2
-
35
-
-
56649106031
-
-
Doctoral Dissertation, National Institute of Standards and Technology
-
J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg. 2008. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Doctoral Dissertation, National Institute of Standards and Technology, 117 pages.
-
(2008)
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
, pp. 117
-
-
Hash, J.1
Bowen, P.2
Johnson, A.3
Smith, C.D.4
Steinberg, D.I.5
-
37
-
-
84971206231
-
-
2014. Retrieved November 16, 2015, from
-
J. Sissel. 2014. Process any data, from any source. (2014). Retrieved November 16, 2015, from https://www.elastic.co/products/logstash.
-
(2014)
Process Any Data, from Any Source
-
-
Sissel, J.1
-
39
-
-
79953653695
-
Monitoring cloud computing by layer, part 1
-
J. Spring. 2011. Monitoring cloud computing by layer, part 1. IEEE Security Privacy 9, 2 (2011), 66-68.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.2
, pp. 66-68
-
-
Spring, J.1
-
40
-
-
84971301533
-
-
Amazon. Retrieved November 16, 2015, from
-
J. Stoppelman. 2004. AWS Case Study: Yelp. Case Study. Amazon. Retrieved November 16, 2015, from https://aws.amazon.com/solutions/case-studies/yelp/.
-
(2004)
AWS Case Study: Yelp. Case Study
-
-
Stoppelman, J.1
-
41
-
-
84971348067
-
Security and privacy controls for federal information systems and organizations
-
2013
-
J. T. Force and T. Initiative. 2013. Security and privacy controls for federal information systems and organizations. NIST Spec. Publ. 800 (2013), 53.
-
(2013)
NIST Spec. Publ.
, vol.800
, pp. 53
-
-
Force, J.T.1
Initiative, T.2
-
43
-
-
84997698175
-
LISS: Log data integrity support scheme for reliable log analysis of osp
-
J. W. Joo, J. H. Park, S. K. Suk, and D. G. Lee. 2014. LISS: Log data integrity support scheme for reliable log analysis of osp. J. Converg. 5, 4 (2014), 1-5.
-
(2014)
J. Converg.
, vol.5
, Issue.4
, pp. 1-5
-
-
Joo, J.W.1
Park, J.H.2
Suk, S.K.3
Lee, D.G.4
-
44
-
-
84863173462
-
Analysis farm: A cloud-based scalable aggregation and query platform for network log analysis
-
Hong Kong
-
J. Wei, Y. Zhao, K. Jiang, R. Xie, and Y. Jin. 2011. Analysis farm: A cloud-based scalable aggregation and query platform for network log analysis. In Proceedings of the IEEE International Conference on Cloud and Service Computing (CSC). Hong Kong, 354-359.
-
(2011)
Proceedings of the IEEE International Conference on Cloud and Service Computing (CSC)
, pp. 354-359
-
-
Wei, J.1
Zhao, Y.2
Jiang, K.3
Xie, R.4
Jin, Y.5
-
45
-
-
85092042971
-
Don't stack your log on my log
-
Broomfield, USA
-
J. Yang. N. Plasson, G. Gillis, N. Talagala, and S. Sundararaman. 2014. Don't stack your log on my log. In USENIX Workshop on Interactions of NVM/Flash with Operating Systems and Workloads (INFLOW). Broomfield, USA.
-
(2014)
USENIX Workshop on Interactions of NVM/Flash with Operating Systems and Workloads (INFLOW)
-
-
Yang, J.1
Plasson, N.2
Gillis, G.3
Talagala, N.4
Sundararaman, S.5
-
52
-
-
84958754081
-
Cloud forensics
-
Springer, Berlin
-
K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie. 2011. Cloud forensics. Advances in Digital Forensics VII. Springer, Berlin, 35-46.
-
(2011)
Advances in Digital Forensics VII.
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
53
-
-
84872709161
-
Key terms for service level agreements to support cloud forensics
-
Springer, Berlin
-
K. Ruan, J. James, J. Carthy, and T. Kechadi. 2012. Key terms for service level agreements to support cloud forensics. Advances in Digital Forensics VIII. Springer, Berlin, 201-212.
-
(2012)
Advances in Digital Forensics VIII.
, pp. 201-212
-
-
Ruan, K.1
James, J.2
Carthy, J.3
Kechadi, T.4
-
55
-
-
77950347409
-
A view of cloud computing
-
2010
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. 2010. A view of cloud computing. Commun. ACM 53, 4 (2010), 50-58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
56
-
-
84971206272
-
-
Technical Report. SplunkStorm.
-
M. Baum. 2014. Analyze & troubleshoot your cloud applications. Technical Report. SplunkStorm. https://www.splunk.com/web-assets/pdfs/secure/Storm-Product-Fact-Sheet.pdf.
-
(2014)
Analyze & Troubleshoot Your Cloud Applications
-
-
Baum, M.1
-
58
-
-
84866690602
-
Forensics investigation challenges in cloud computing environments
-
M. Damshenas, A. Dehghantanha, R. Mahmoud, and S. B. Shamsuddin. 2012. Forensics investigation challenges in cloud computing environments. In Proceedings of the IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensics (CyberSec). 190-194.
-
(2012)
Proceedings of the IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensics (CyberSec).
, pp. 190-194
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.B.4
-
59
-
-
84971208566
-
-
2013. Retrieved November 16, 2015, from
-
M. Ellis. 2013. IBM Operations Analytics-Log Analysis. (2013). Retrieved November 16, 2015, from http://www-03.ibm.com/software/products/en/ibm-operations-analytics-log-analysis.
-
(2013)
IBM Operations Analytics-Log Analysis
-
-
Ellis, M.1
-
61
-
-
84891910899
-
Secure log transfer by replacing a library in a virtual machine
-
Springer, Berlin
-
M. Sato and T. Yamauchi. 2013. Secure log transfer by replacing a library in a virtual machine. In Advances in Information and Computer Security. Springer, Berlin, 1-18.
-
(2013)
Advances in Information and Computer Security.
, pp. 1-18
-
-
Sato, M.1
Yamauchi, T.2
-
62
-
-
84925485658
-
Energy efficient computational offloading framework for mobile cloud computing
-
M. Shiraz, A. Gani, A. Shamim, S. Khan, and R. W. Ahmad. 2015. Energy efficient computational offloading framework for mobile cloud computing. J. Grid Comput. 13, 1 (2015), 1-18.
-
(2015)
J. Grid Comput.
, vol.13
, Issue.1
, pp. 1-18
-
-
Shiraz, M.1
Gani, A.2
Shamim, A.3
Khan, S.4
Ahmad, R.W.5
-
63
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
M. Taylor, J. Haggerty, D. Gresty, and D. Lamb. 2011. Forensic investigation of cloud computing systems. Network Security 2011, 3 (2011), 4-10.
-
(2011)
Network Security
, vol.2011
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
64
-
-
85077127931
-
BlueSky: A cloud-backed file system for the enterprise
-
San Jose, CA, USA
-
M. Vrable, S. Savage, and G. M. Voelker. 2012. BlueSky: A cloud-backed file system for the enterprise. In Proceedings of the 10th USENIX Conference on File and Storage Technologies. San Jose, CA, USA, 19-19.
-
(2012)
Proceedings of the 10th USENIX Conference on File and Storage Technologies
, pp. 19
-
-
Vrable, M.1
Savage, S.2
Voelker, G.M.3
-
65
-
-
84971331318
-
Encrypted query processing based log management in the cloud for improved potential for confidentiality
-
N. Prabha, C. Timotta, T. Rajan, and A. Jaleef PK. 2014. Encrypted query processing based log management in the cloud for improved potential for confidentiality. Int. J. Comput. Appl. Technol. Res. 3, 5. (2014), 309-311.
-
(2014)
Int. J. Comput. Appl. Technol. Res.
, vol.3
, Issue.5
, pp. 309-311
-
-
Prabha, N.1
Timotta, C.2
Rajan, T.3
Jaleef, P.K.A.4
-
67
-
-
84971341739
-
-
2014. Retrieved November 16, 2015, from
-
P. Heath. 2014. Monitor your apps every single second. (2014). Retrieved November 16, 2015, from http://www.bmc.com/truesightpulse/customers/.
-
(2014)
Monitor Your Apps Every Single Second.
-
-
Heath, P.1
-
70
-
-
84927804589
-
Sierpinski triangle based data center architecture in cloud computing
-
Q. Han, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan. 2014. Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69, 2 (2014), 887-907.
-
(2014)
J. Supercomput.
, vol.69
, Issue.2
, pp. 887-907
-
-
Han, Q.1
Shiraz, M.2
Gani, A.3
Whaiduzzaman, M.4
Khan, S.5
-
71
-
-
80955144922
-
Enabling security in cloud storage SLAs with cloudproof
-
(2011)
-
R. A. Popa, J. R. Lorch, D. Molnar, H. J.Wang, and L. Zhuang. 2011. Enabling security in cloud storage SLAs with cloudproof. In Usenix Annual Technical Conference. 242 (2011).
-
(2011)
Usenix Annual Technical Conference.
, vol.242
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
72
-
-
56349150824
-
Market-Oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities
-
R. Buyya, C. S. Yeo, and S. Venugopalirk. 2008. Market-Oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceeding of the IEEE 10th International Conference on High Performance Computing and Communications. 5-13.
-
(2008)
Proceeding of the IEEE 10th International Conference on High Performance Computing and Communications.
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopalirk, S.3
-
73
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
(2009
-
R. Buyya, C. S. Yeo, S. Venugopalirk, J. Broberg, and I. Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Comput. Syst. 25, 6 (2009), 599-616.
-
(2009)
Future Generation Comput. Syst.
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopalirk, S.3
Broberg, J.4
Brandic, I.5
-
74
-
-
84971292033
-
-
2014. Retrieved November 16, 2015 from
-
R. Dahl. 2014. Node.js on the Road. (2014). Retrieved November 16, 2015 from https://www.joyent.com/noderoad.
-
(2014)
Node.js on the Road
-
-
Dahl, R.1
-
77
-
-
84881031510
-
Trust model: Cloud's provider and cloud's user
-
2012
-
S. Ahmad, B. Ahmad, S. M. Saqib, and R. M. Khattak. 2012. Trust model: Cloud's provider and cloud's user. Int. J. Adv. Sci. Technol. 44, (2012), 69-80.
-
(2012)
Int. J. Adv. Sci. Technol.
, vol.44
, pp. 69-80
-
-
Ahmad, S.1
Ahmad, B.2
Saqib, S.M.3
Khattak, R.M.4
-
78
-
-
84971288404
-
-
2014. Retrieved November 16, 2015, from
-
S. Butterfield, E. Costello, C. Henderson, and S. Mourachov. 2014. Slack so yeah, we tried slack. (2014). Retrieved November 16, 2015, from https://slack.com/.
-
(2014)
Slack so Yeah, We Tried Slack
-
-
Butterfield, S.1
Costello, E.2
Henderson, C.3
Mourachov, S.4
-
80
-
-
84971323097
-
-
(in press)
-
S. Khan, A. Gani, A.W. A.Wahab, M. Shiraz, and I. Ahmad. 2016. Network forensics: Review, taxonomy, and open challenges. (in press).
-
(2016)
Network Forensics: Review, Taxonomy, and Open Challenges
-
-
Khan, S.1
Gani, A.2
Wahab, A.W.A.3
Shiraz, M.4
Ahmad, I.5
-
81
-
-
84925944148
-
Forensic challenges in mobile cloud computing
-
S. Khan, E. Ahmad, M. Shiraz, A. Gani, A.W. A.Wahab, and M. A. Bagiwa. 2014a. Forensic challenges in mobile cloud computing. In Proceeding of the IEEE International Conference on Computer, Communication, and Control Technology (I4CT 2014). 343-347.
-
(2014)
Proceeding of the IEEE International Conference on Computer, Communication, and Control Technology (I4CT 2014
, pp. 343-347
-
-
Khan, S.1
Ahmad, E.2
Shiraz, M.3
Gani, A.4
Wahab, A.W.A.5
Bagiwa, M.A.6
-
82
-
-
85086951631
-
The median resource failure check pointing
-
S. Khan, K. Hayat, S. A. Madani, S. U. Khan, and J. Kolodziej. 2012. The median resource failure check pointing. In 26th European Conference on Modelling and Simulation (ECMS). 483-489.
-
(2012)
26th European Conference on Modelling and Simulation (ECMS).
, pp. 483-489
-
-
Khan, S.1
Hayat, K.2
Madani, S.A.3
Khan, S.U.4
Kolodziej, J.5
-
83
-
-
84904646449
-
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
-
2014), 27
-
S. Khan, M. Shiraz, A. W. A. Wahab, A. Gani, Q. Han, and Z. B. A. Rahman. 2014b. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014), 27.
-
(2014)
Sci. World J.
, vol.2014
, pp. 547062
-
-
Khan, S.1
Shiraz, M.2
Wahab, A.W.A.3
Gani, A.4
Han, Q.5
Rahman, Z.B.A.6
-
85
-
-
84903211718
-
Cloud forensics: Identifying the major issues and challenges
-
Springer, Berlin
-
S. Simou, C. Kalloniatis, E. Kavakli, and S. Gritzalis. 2014. Cloud forensics: Identifying the major issues and challenges. In Advanced Information Systems Engineering. Springer, Berlin, 271-284.
-
(2014)
Advanced Information Systems Engineering.
, pp. 271-284
-
-
Simou, S.1
Kalloniatis, C.2
Kavakli, E.3
Gritzalis, S.4
-
87
-
-
84866017796
-
Flag commit: Supporting efficient transaction recovery in flash-based dbmss
-
2012
-
S. T. On, J. Xu, B. Choi, H. Hu, and B. He. 2012. Flag commit: Supporting efficient transaction recovery in flash-based dbmss. IEEE Trans. Knowled. Data Eng. 24, 9 (2012), 1624-1639.
-
(2012)
IEEE Trans. Knowled. Data Eng.
, vol.24
, Issue.9
, pp. 1624-1639
-
-
On, S.T.1
Xu, J.2
Choi, B.3
Hu, H.4
He, B.5
-
90
-
-
79958195538
-
Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques
-
Springer, Berlin
-
S. Thorpe, I. Ray, and T. Grandison. 2011c. Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. In Computational Intelligence in Security for Information Systems. Springer, Berlin, 265-271.
-
(2011)
Computational Intelligence in Security for Information Systems.
, pp. 265-271
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
-
92
-
-
84881157523
-
Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations
-
Springer, Berlin
-
S. Thorpe, I. Ray, T. Grandison, A. Barbir, and R. France. 2013b. Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. In Data and Applications Security and Privacy XXVII. Springer, Berlin, 97-112.
-
(2013)
Data and Applications Security and Privacy
, vol.27
, pp. 97-112
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
Barbir, A.4
France, R.5
-
93
-
-
84971328814
-
A formal temporal log data model for the global synchronized virtual machine environment
-
S. Thorpe, I. Ray, I. Ray, and T. Grandison. 2011d. A formal temporal log data model for the global synchronized virtual machine environment. Int. J. Inform. Assur. Secur. 6, 2 (2011), 398-406.
-
(2011)
Int. J. Inform. Assur. Secur.
, vol.6
, Issue.2
, pp. 398-406
-
-
Thorpe, S.1
Ray, I.2
Ray, I.3
Grandison, T.4
-
94
-
-
84873957734
-
Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment
-
Springer, Berlin
-
S. Thorpe, I. Ray, I. Ray, T. Grandison, A. Barbir, and R. France. 2012b. Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment. In Digital Forensics and Cyber Crime. Springer, Berlin, 156-171.
-
(2012)
Digital Forensics and Cyber Crime.
, pp. 156-171
-
-
Thorpe, S.1
Ray, I.2
Ray, I.3
Grandison, T.4
Barbir, A.5
France, R.6
-
95
-
-
84888060581
-
Towards a forensic-based service oriented architecture framework for auditing of cloud logs
-
S. Thorpe, T. Grandison, A. Campbell, J. Williams, K. Burrell, and I. Ray. 2013a. Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In Proceeding of the IEEE 9th World Congress on Services. 75-83.
-
(2013)
Proceeding of the IEEE 9th World Congress on Services.
, pp. 75-83
-
-
Thorpe, S.1
Grandison, T.2
Campbell, A.3
Williams, J.4
Burrell, K.5
Ray, I.6
-
97
-
-
84971348030
-
-
(2014). Retrieved November 16th, 2015 from
-
T. R. Wyatt. 2009. Mission: Messaging: Circular Logs Vs Linear Logs. (2014). Retrieved November 16th, 2015 from http://www.ibm.com/developerworks/websphere/techjournal/0904-mismes.html.
-
(2009)
Mission: Messaging: Circular Logs Vs Linear Logs
-
-
Wyatt, T.R.1
-
100
-
-
84944030615
-
-
Infrastructure Security. Springer, Berlin
-
U. Flegel. 2002. Pseudonymizing unix log files. In Infrastructure Security. Springer, Berlin, 162-179.
-
(2002)
Pseudonymizing Unix Log Files
, pp. 162-179
-
-
Flegel, U.1
-
101
-
-
85015519601
-
Hypervisor security in cloud computing systems
-
V. Wesley, T. Harris, L. Long Jr., and R. Green. 2014. Hypervisor security in cloud computing systems. ACM Comput. Surv. (2014), 1-22.
-
(2014)
ACM Comput. Surv.
, vol.2014
, pp. 1-22
-
-
Wesley, V.1
Harris, T.2
Long, L.3
Green, R.4
-
104
-
-
84877990370
-
SecLaaS: Secure logging-As-A-service for cloud forensics
-
ACM, New York, NY
-
Z. Shams, A. K. Dutta, and R. Hasan. 2013. SecLaaS: Secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, New York, NY, 219-230.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 219-230
-
-
Shams, Z.1
Dutta, A.K.2
Hasan, R.3
-
105
-
-
84923927275
-
Towards building a forensics aware language for secure logging
-
Z. Shams, M. Mernik, and R. Hasan. 2014. Towards building a forensics aware language for secure logging. Comput. Sci. Inform. Syst. 11, 4 (2014), 1291-1314.
-
(2014)
Comput. Sci. Inform. Syst.
, vol.11
, Issue.4
, pp. 1291-1314
-
-
Shams, Z.1
Mernik, M.2
Hasan, R.3
|