Forensic investigation of cloud computing systems

Network Security - Tập 2011 - Trang 4-10 - 2011
Mark Taylor, John Haggerty, David Gresty, David Lamb

Tài liệu tham khảo

Li, X; Seberry, J. ‘Forensic Computing’. 4th International Conference on Cryptology in India – Progress in Cryptology INDOCRYPT 2003, Chennai, India, Springer, Germany, pp.18-35. Mohay G; Anderson, A; Collie, B; del Vel, O. Computer and intrusion forensics, Artech House, Boston, MA, US, (2003) pp.9. Grossman, 2009, ‘The case for cloud computing’, IT Professional, 11, 23, 10.1109/MITP.2009.40 Treacy, 2009, ‘Cloud computing: data protection concerns unwrapped’, Privacy and Data Protection, 9, 1 Richard, 2006, ‘Next-generation digital forensics’, Communications of the ACM, 49, 76, 10.1145/1113034.1113074 Haggerty, 2006, ‘Managing corporate computer forensics’, Computer Fraud and Security, 6, 14, 10.1016/S1361-3723(06)70368-2 Bowen, 2000, ‘Designing host and network sensors to mitigate the insider threat’, IEEE Security and Privacy, 7, 22, 10.1109/MSP.2009.109 Meng, F; Wu, S; Yang, J; Yu, G. ‘Research of an e-mail forensic and analysis system based on visualization’. Asia-Pacific Conference on Computational Intelligence and Industrial Applications PACIIA, 2009, Wuhan, 281-284. Pendyala, 2009, ‘The Web as the ubiquitous computer’, Computer, 42, 90, 10.1109/MC.2009.302 Viega, 2009, ‘Cloud computing and the common man’, Computer, 42, 106, 10.1109/MC.2009.252