-
1
-
-
68249129760
-
Above the clouds: a Berkeley view of cloud computing
-
Technical report no. UCB/EECS-2009-28, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M., 2009. Above the clouds: a Berkeley view of cloud computing. Technical report no. UCB/EECS-2009-28, University of California, Berkeley.
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84870277066
-
Calm before the storm: the challenges of cloud computing in digital forensics
-
Grispos G., Storer T., Glisson W.B. Calm before the storm: the challenges of cloud computing in digital forensics. Int. J. Digit. Crime Forensics 2012, 4(2):28-48.
-
(2012)
Int. J. Digit. Crime Forensics
, vol.4
, Issue.2
, pp. 28-48
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
8
-
-
85054289560
-
-
Box Triples Enterprise Revenue in 2011
-
MarketWire Box Triples Enterprise Revenue in 2011 2012, Available from: Box Triples Enterprise Revenue in 2011. http://www.marketwire.com/press-release/box-triples-enterprise-revenue-in-2011-1605187.htm.
-
(2012)
Box Triples Enterprise Revenue in 2011
-
-
-
9
-
-
85054209868
-
-
Available from
-
Mozy Mozy-About Us 2014, Available from. http://mozy.com/about/about-mozy.
-
(2014)
Mozy-About Us
-
-
-
10
-
-
85057213220
-
Personal Cloud Services Emerge to Orchestrate Our Mobile Computing Lives
-
A Forrester Consulting Thought Leadership Paper Commissioned By SugarSync
-
Forrester Consulting, 2012. Personal Cloud Services Emerge to Orchestrate Our Mobile Computing Lives. A Forrester Consulting Thought Leadership Paper Commissioned By SugarSync. https://www.sugarsync.com/media/sugarsync-forrester-report.pdf.
-
(2012)
-
-
-
11
-
-
85054204808
-
-
Available from: Box Triples Enterprise Cloud Storage Revenue
-
CRN Box Triples Enterprise Cloud Storage Revenue 2012, Available from: Box Triples Enterprise Cloud Storage Revenue. http://www.crn.com/news/cloud/232400190/box-triples-enterprise-cloud-storage-revenue.htm.
-
(2012)
Box Triples Enterprise Cloud Storage Revenue
-
-
-
12
-
-
85054248127
-
-
Available from:
-
MarketWire Box Sees 70 percent growth in legal services cloud adoption 2012, Available from:. http://www.marketwire.com/press-release/Box-Sees-70-Percent-Growth-in-Legal-Services-Cloud-Adoption-1749461.htm.
-
(2012)
Box Sees 70 percent growth in legal services cloud adoption
-
-
-
13
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S., Kavitha V. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011, 34(1):1-11.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
15
-
-
79959433819
-
-
National Institute of Standards and Technology, Gaithersburg, Maryland, USA
-
Jansen W., Grance T. Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication 800-144 2011, National Institute of Standards and Technology, Gaithersburg, Maryland, USA.
-
(2011)
Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication 800-144
-
-
Jansen, W.1
Grance, T.2
-
18
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis D., Lekkas D. Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 2012, 28(3):583-592.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
19
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman L.M. Data security in the world of cloud computing. IEEE Secur. Priv. 2009, 7(4):61-64.
-
(2009)
IEEE Secur. Priv.
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
22
-
-
84872361020
-
-
TrendMicro Cloud Security Survey Global Executive Summary 2011, http://www.trendmicro.com/cloud-content/us/pdfs/about/presentation-global-cloud-survey_exec-summary.pdf.
-
(2011)
Cloud Security Survey Global Executive Summary
-
-
-
25
-
-
84958754081
-
Cloud forensics
-
Springer, Boston, G. Peterson, S. Shenoi (Eds.)
-
Ruan K., Carthy J., Kechadi T., Crosbie M. Cloud forensics. Advances in Digital Forensics VII 2011, 35-46. Springer, Boston. G. Peterson, S. Shenoi (Eds.).
-
(2011)
Advances in Digital Forensics VII
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
26
-
-
77955574175
-
Digital evidence in cloud computing systems
-
Taylor M., Haggerty J., Gresty D., Hegarty R. Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 2010, 26(3):304-308.
-
(2010)
Comput. Law Secur. Rev.
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
27
-
-
78049416058
-
-
Gartner: Seven cloud-computing security risks
-
Brodkin J. Gartner-Seven Cloud-Computing Security Risks Available from: Gartner: Seven cloud-computing security risks. http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853.
-
Gartner-Seven Cloud-Computing Security Risks
-
-
Brodkin, J.1
-
28
-
-
48749111433
-
-
National Institute of Standards and Technology, Gaithersburg, Maryland, USA
-
Jansen W., Ayers R. Guidelines on Cell Phone Forensics. NIST Special Publication 800-101 2007, National Institute of Standards and Technology, Gaithersburg, Maryland, USA.
-
(2007)
Guidelines on Cell Phone Forensics. NIST Special Publication 800-101
-
-
Jansen, W.1
Ayers, R.2
-
31
-
-
84905818029
-
-
Available from: Google. "Google Security Whitepaper: Google Apps Messaging and Collaboration Products".
-
Google Security Whitepaper: Google Apps Messaging and Collaboration Products 2011, Available from: Google. "Google Security Whitepaper: Google Apps Messaging and Collaboration Products". https://www.google.co.uk/work/apps/business/resources/docs/security-whitepaper.html.
-
(2011)
Security Whitepaper: Google Apps Messaging and Collaboration Products
-
-
-
33
-
-
84890845543
-
-
H.S. Venter, M. Coetzee, M. Loock (Eds.)
-
Delport W., Olivier M.S., Kohn M. Isolating a cloud instance for a digital forensic investigation 2011, H.S. Venter, M. Coetzee, M. Loock (Eds.).
-
(2011)
Isolating a cloud instance for a digital forensic investigation
-
-
Delport, W.1
Olivier, M.S.2
Kohn, M.3
-
34
-
-
85054268447
-
-
Amazon Web Services. "About AWS Security Credentials
-
Amazon Web Services About AWS Security Credentials 2011, Available from: Amazon Web Services. "About AWS Security Credentials". http://docs.aws.amazon.com/AWSSecurityCredentials/1.0/AboutAWSCredentials.html.
-
(2011)
About AWS Security Credentials
-
-
-
36
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
Chung H., Park J., Lee S., Kang C. Digital forensic investigation of cloud storage services. Digit. Investig. 2012, 9(2):81-95.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
37
-
-
84865990808
-
Methodology for digital forensic investigation of iCloud
-
Springer, Netherlands, J.H. Park (Ed.)
-
Lee J., Chung H., Lee C., Lee S. Methodology for digital forensic investigation of iCloud. Information Technology Convergence, Secure and Trust Computing, and Data Management 2012, 197-206. Springer, Netherlands. J.H. Park (Ed.).
-
(2012)
Information Technology Convergence, Secure and Trust Computing, and Data Management
, pp. 197-206
-
-
Lee, J.1
Chung, H.2
Lee, C.3
Lee, S.4
-
38
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
Quick D., Choo K.-K.R. Dropbox analysis: data remnants on user machines. Digit. Investig. 2013, 10(1):3-18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
39
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick D., Choo K.-K.R. Digital droplets: Microsoft SkyDrive forensic data remnants. Futur. Gener. Comput. Syst. 2013, 29(6):1378-1394.
-
(2013)
Futur. Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
40
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
Quick D., Choo K.-K.R. Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 2014, 40:179-193.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
41
-
-
84902429611
-
-
Syngress, Amsterdam, the Netherlands
-
Quick D., Martini B., Choo R. Cloud Storage Forensics 2013, Syngress, Amsterdam, the Netherlands.
-
(2013)
Cloud Storage Forensics
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
42
-
-
84884589497
-
Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
-
Quick D., Choo K.-K.R. Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?. Digit. Investig. 2013, 10(3):266-277.
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
43
-
-
84889083567
-
Cloud storage forensics: ownCloud as a case study
-
Martini B., Choo K.-K.R. Cloud storage forensics: ownCloud as a case study. Digit. Investig. 2013, 10(4):287-299.
-
(2013)
Digit. Investig.
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
44
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
Martini B., Choo K.-K.R. Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 2014, 11(4):295-313.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
47
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
Grispos G., Storer T., Glisson W.B. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit. Investig. 2011, 8(1):23-36.
-
(2011)
Digit. Investig.
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
48
-
-
80053916164
-
Electronic retention: what does your mobile phone reveal about you?
-
Glisson W., Storer T., Mayall G., Moug I., Grispos G. Electronic retention: what does your mobile phone reveal about you?. Int. J. Inf. Secur. 2011, 10(6):337-349.
-
(2011)
Int. J. Inf. Secur.
, vol.10
, Issue.6
, pp. 337-349
-
-
Glisson, W.1
Storer, T.2
Mayall, G.3
Moug, I.4
Grispos, G.5
-
52
-
-
85054216683
-
Cellebrite UFED, Cellebrite UFED
-
Cellebrite. Cellebrite UFED. Available from: Cellebrite UFED,. http://www.cellebrite.com/mobile-forensics-products/forensics-products.html.
-
-
-
-
53
-
-
85054282639
-
What is XRY?. What is XRY?
-
Micro Systemation. What is XRY?. Available from: What is XRY?,. http://www.msab.com/xry/what-is-xry.
-
-
-
-
54
-
-
48749091043
-
An overall assessment of mobile internal acquisition tool
-
Distefano A., Me G. An overall assessment of mobile internal acquisition tool. Digit. Investig. 2008, 5(Suppl.):S121-S127.
-
(2008)
Digit. Investig.
, vol.5
, pp. S121-S127
-
-
Distefano, A.1
Me, G.2
-
55
-
-
84875521372
-
Device Seizure
-
Device Seizure
-
Paraben, n.d. Device Seizure. Available from: Device Seizure,. http://www.paraben.com/device-seizure.html.
-
-
-
-
56
-
-
73649128677
-
-
Available from: RAPI Tools
-
Hengeveld W.J. RAPI Tools Available from: RAPI Tools. http://itsme.home.xs4all.nl/projects/xda/tools.html.
-
RAPI Tools
-
-
Hengeveld, W.J.1
-
58
-
-
85054249417
-
-
Department of Defense Computer Forensics Lab. dcfldd. 2006; Available from:. http://dcfldd.sourceforge.net/.
-
(2006)
-
-
-
60
-
-
79958151775
-
-
O'Reilly Media, Incorporated, Sebastopol, California, USA
-
Zdziarski J. iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets 2008, O'Reilly Media, Incorporated, Sebastopol, California, USA.
-
(2008)
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
-
-
Zdziarski, J.1
-
61
-
-
85054238841
-
Get Started with the Box API
-
Box Developer Documentation, 2015. Get Started with the Box API. Available from:. https://developers.box.com/get-started/.
-
(2015)
-
-
|