Distributed filesystem forensics: XtreemFS as a case study
Tài liệu tham khảo
Almulla, 2013, Cloud forensics: a research perspective, 66
BabuDB
Beath, 2012, Finding value in the information explosion, MIT Sloan Manag Rev, 53, 18
Beyer, 2012
Birk, 2011, Technical issues of forensic investigations in cloud computing environments, 1
Butler, 2013, IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: an Australian perspective, Secur J, 10.1057/sj.2013.29
Casonato, 2013
Ceph, 2014
Cho, 2012, Cyber forensic for hadoop based cloud system, Int J Secur Its Appl, 6, 83
Chonka, 2012, Detecting and mitigating hx-dos attacks against cloud web services, 429
Choo, 2010, Cloud computing: challenges and future directions, Trends Issues Crime Crim Justice, 400, 1
Chua
Chung, 2012, Digital forensic investigation of cloud storage services, Digit Investig, 9, 81, 10.1016/j.diin.2012.05.015
Contrail
Dukaric, 2013, Towards a unified taxonomy and architecture of cloud frameworks, Future Gener Comput Syst, 29, 1196, 10.1016/j.future.2012.09.006
Dykstra, 2013, Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing, Richmond J Law Technol, XIX, 1
Dykstra, 2013, Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform, Digit Investig, 10, S87, 10.1016/j.diin.2013.06.010
Enke, 2012, Handling big data in astronomy and astrophysics: rich structured queries on replicated cloud data with XtreemFS, Datenbank-Spektrum, 12, 173, 10.1007/s13222-012-0099-1
Federici, 2014, Cloud data imager: a unified answer to remote acquisition of cloud storage areas, Digit Investig, 11, 30, 10.1016/j.diin.2014.02.002
Fraunhofer
Gellman, 2013, Inner workings of a top-secret spy program, Wash Post
Gluster, 2014, Write once, read everywhere – Gluster, Red Hat
Greenwald, 2013, The top secret rules that allow NSA to use US data without a warrant, Guard
Hale, 2013, Amazon cloud drive forensic analysis, Digit Investig, 10, 259, 10.1016/j.diin.2013.04.006
Hay, 2011, Storm clouds rising: security challenges for IaaS cloud computing, 1
Hegarty, 2011, Forensic analysis of distributed service oriented computing platforms
Hooper, 2013, Cloud computing and its implications for cybercrime investigations in Australia, Comput Law Secur Rev, 29, 152, 10.1016/j.clsr.2013.01.006
Info-communications Development Authority of Singapore, 2012, Big data, 1
Kent, 2006
Kielmann, 2010, XtreemOS: a sound foundation for cloud infrastructure and federations, 1
Kleineweber, 2014, QoS-aware storage virtualization for cloud file systems, 19
Krüger, 2014, Performance studies on distributed virtual screening, BioMed Res Int, 2014, 10.1155/2014/624024
Martini, 2012, An integrated conceptual digital forensic framework for cloud computing, Digit Investig, 9, 71, 10.1016/j.diin.2012.07.001
Martini, 2013, Cloud storage forensics: ownCloud as a case study, Digit Investig, 10, 287, 10.1016/j.diin.2013.08.005
Martini, 2014, Remote programmatic vCloud forensics: a six-step collection process and a proof of concept, 935
Marty, 2011, Cloud application logging for forensics, 178
McKemmish, 1999, What is forensic computing?, Trends Issues Crime Crim Justice, 118, 1
National Institute of Standards and Technology, 2011
Patel, 2013, An intrusion detection and prevention system in cloud computing: a systematic review, J Netw Comput Appl, 36, 25, 10.1016/j.jnca.2012.08.007
Petcu, 2013, Portable cloud applications—from theory to practice, Future Gener Comput Syst, 29, 1417, 10.1016/j.future.2012.01.009
Pierre, 2012, ConPaaS: a platform for hosting elastic cloud applications, IEEE Internet Comput, 16, 88, 10.1109/MIC.2012.105
Quick, 2014
Stender, 2012, XtreemFS—a file system for the cloud, 267
United States Foreign Intelligence Surveillance Court
United States National Institute of Justice (US NIJ), 2004
United States National Intelligence Council
XtreemFS
Zatyko, 2012, The digital forensics cyber exchange principle, Forensic Mag, 13