Forensic investigation of cloud computing systems
Tài liệu tham khảo
Li, X; Seberry, J. ‘Forensic Computing’. 4th International Conference on Cryptology in India – Progress in Cryptology INDOCRYPT 2003, Chennai, India, Springer, Germany, pp.18-35.
Mohay G; Anderson, A; Collie, B; del Vel, O. Computer and intrusion forensics, Artech House, Boston, MA, US, (2003) pp.9.
Grossman, 2009, ‘The case for cloud computing’, IT Professional, 11, 23, 10.1109/MITP.2009.40
Treacy, 2009, ‘Cloud computing: data protection concerns unwrapped’, Privacy and Data Protection, 9, 1
Richard, 2006, ‘Next-generation digital forensics’, Communications of the ACM, 49, 76, 10.1145/1113034.1113074
Haggerty, 2006, ‘Managing corporate computer forensics’, Computer Fraud and Security, 6, 14, 10.1016/S1361-3723(06)70368-2
Bowen, 2000, ‘Designing host and network sensors to mitigate the insider threat’, IEEE Security and Privacy, 7, 22, 10.1109/MSP.2009.109
Meng, F; Wu, S; Yang, J; Yu, G. ‘Research of an e-mail forensic and analysis system based on visualization’. Asia-Pacific Conference on Computational Intelligence and Industrial Applications PACIIA, 2009, Wuhan, 281-284.
Pendyala, 2009, ‘The Web as the ubiquitous computer’, Computer, 42, 90, 10.1109/MC.2009.302
Viega, 2009, ‘Cloud computing and the common man’, Computer, 42, 106, 10.1109/MC.2009.252