메뉴 건너뛰기




Volumn 4, Issue 5, 2006, Pages 16-25

Scrubbing Stubborn Data An Evaluation of Counter-Forensic Privacy Tools

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85008016160     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2006.132     Document Type: Article
Times cited : (8)

References (9)
  • 1
    • 4944232725 scopus 로고    scopus 로고
    • CSI/FBI Computer Crime and Security Survey
    • www.gocsi. com/forms/fbi/csi_fbi_survey.jhtml
    • L.A. Gordon et al., CSI/FBI Computer Crime and Security Survey, Computer Security Inst.; 2004; www.gocsi. com/forms/fbi/csi_fbi_survey.jhtml.
    • (2004) Computer Security Inst.
    • Gordon, L.A.1
  • 3
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of Data Passed: A Study of Disk Sanitization Practices
    • S.L. Garfinkel and A. Shelat, “Remembrance of Data Passed: A Study of Disk Sanitization Practices,” IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 17–27.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.L.1    Shelat, A.2
  • 4
    • 85008013933 scopus 로고    scopus 로고
    • To Keep Those Secrets Safe, Beat Your Computer's Brains Out with A Hammer
    • 17 Feb. www. timesonline.co.uk/article/0, 2 -1487674,00.html
    • B. Hoyle, “To Keep Those Secrets Safe, Beat Your Computer's Brains Out with A Hammer,” The Times of London, 17 Feb. 2005; www.timesonline.co.uk/article/0, 2 -1487674,00.html.
    • (2005) The Times of London
    • Hoyle, B.1
  • 6
    • 0004610703 scopus 로고    scopus 로고
    • Secure Deletion of Data from Magnetic and Solid-State Memory
    • Usenix Assoc., pp. 77-89; www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    • P. Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Proc. Sixth Usenix Security Symp., Usenix Assoc., 1996, pp. 77-89; www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
    • (1996) Proc. Sixth Usenix Security Symp.
    • Gutmann, P.1
  • 7
    • 33845978973 scopus 로고    scopus 로고
    • Policies to Enhance Computer and Network Forensics
    • US Military Academy, www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperW2B3(37).pdf
    • A. Yasinsac and Y. Manzano, “Policies to Enhance Computer and Network Forensics.” Proc. IEEE Workshop on Information Assurance and Security, US Military Academy, 2001; www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperW2B3(37).pdf.
    • (2001) Proc. IEEE Workshop on Information Assurance and Security
    • Yasinsac, A.1    Manzano, Y.2
  • 8
    • 85008031806 scopus 로고    scopus 로고
    • US District Court, Northern District of Illinois, case no. 1403, doc. no. 127, www.ilnd.uscourts.gov/racer2
    • Kucala Enterprises v Auto Wax Co., US District Court, Northern District of Illinois, case no. 1403, doc. no. 127, 2003; www.ilnd.uscourts.gov/racer2.
    • (2003) Kucala Enterprises v Auto Wax Co.
  • 9
    • 84868338921 scopus 로고    scopus 로고
    • Indictment in United States District Court, Northern District of Illinois, Eastern Division, www.usdoj.gov/usao/iln/indict/2003/watzman.pdf
    • United States v. H. Marc Watzman, Indictment in United States District Court, Northern District of Illinois, Eastern Division, 2003; www.usdoj.gov/usao/iln/indict/2003/watzman.pdf.
    • (2003) United States v. H. Marc Watzman


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.