Digital droplets: Microsoft SkyDrive forensic data remnants
Tài liệu tham khảo
P. Mell, T. Grance, The NIST definition of cloud computing: recommendations of the National Institute, NIST Special Publication 800-145, 2011.
USGAO, Information technology reform: progress made but future cloud computing efforts should be better planned’, 2012. Available at: http://www.gao.gov/assets/600/592249.pdf.
S. Kleynhans, The new PC Era-the personal cloud, Gartner Inc., 2012. Available at: http://www.gartner.com/resId=1890215.
S. Sinofsky, Windows 8 Launch, 2012. Available at:http://www.microsoft.com/en-us/news/Speeches/2012/10-25Windows8.aspx.
Mason, 2011, Digital evidence and ‘cloud’ computing, Computer Law and Security Review, 27, 524, 10.1016/j.clsr.2011.07.005
Reilly, 2011, Cloud computing: pros and cons for computer forensic investigations, International Journal of Multimedia and Image Processing, 1, 26, 10.20533/ijmip.2042.4647.2011.0004
D. Birk, C. Wegener, Technical issues of forensic investigatinos in cloud computing environments, in: Proceedings of 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, IEEE/SADFE, Oakland, CA, USA, 2011, pp. 1–10.
AGIMO, Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, 2011.
W3Counter, Browser statistics July 2012, 2012. Available at: http://www.w3counter.com/globalstats.php?year=2012&month=7.
ACPO, Good practice guidelines for computer based evidence v4.0, 2006. Available at: www.7safe.com/electronic_evidence.
NIJ, Electronic Crime Scene Investigation: A Guide for First Responders, second ed., 2008. Available at: http://www.nij.gov/pubs-sum/219941.htm.
B. Klimt, Y. Yang, Introducing the Enron corpus, in: First Conference on Email and Anti-Spam, CEAS, 2004.
USDoD, DoD 5220.22-M-Sup 1, National Industrial Security Program Operating Manual Supplement, 1995. Available at: http://www.dtic.mil/whs/directives/corres/pdf/522022MSup1.pdf.
NIST, NIST computer forensic tool testing, 2012. Available at: http://www.cftt.nist.gov/disk_imaging.htm.
F. McClain, Dropbox Forensics, updated 31 May 2011, Forensic Focus, 2011. Available at: http://www.forensicfocus.com/dropbox-forensics.
H. Chung, J. Park, S. Lee, C. Kang, Digital forensic investigation of cloud storage services, Digital Investigation. 2012. Available at: http://www.sciencedirect.com/science/article/pii/S1742287612000400.
Microsoft, How NTFS reserves space for its Master File Table (MFT), 2008. Available at: http://support.microsoft.com/kb/174619.
Microsoft, What is the prefetch folder? 2012. Available at: http://windows.microsoft.com/en-AU/windows-vista/What-is-the-prefetch-folder.
Microsoft, Shortcuts: frequently asked questions’, 2012. Available at: http://windows.microsoft.com/en-us/windows-vista/Shortcuts-frequently-asked-questions.
L. Mueller, Windows 7 Forensics—Part IV—Thumbcache˙*.db’, 2010. Available at: http://www.forensickb.com/2010/01/windows-7-forensics-part-iv.html.
Taylor, 2011, Forensic investigation of cloud computing systems, Network Security, 2011, 4, 10.1016/S1353-4858(11)70024-1
J. Laugesen, Y. Yuan, What factors contributed to the success of Apple’s iPhone? in: Mobile Business and 2010 Ninth Global Mobility Roundtable, ICMB-GMR, 2010 Ninth International Conference on IEEE, 2010, pp. 91–99.
M. Zhu, Mobile cloud computing: implications to smartphone forensic procedures and methodologies, AUT University, 2011.
SAI, HB 171-2003 Guidelines for the management of IT evidence, Standards Australia, Sydney, Australia, 2003.
A. Duffy, Faraday Bag testing in a reverberation chamber—a preliminary study, 2010. Available at: http://www.faradaybag.com/faraday-bag-testing/demontfort-university-faraday-bag-testing.html.