Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Tóm tắt
Từ khóa
Tài liệu tham khảo
Amazon Web Services, 2011
Casey, 2004
Conover, 2008, Code injection from the hypervisor: removing the need for in-guest agents
Dolan-Gabitt, 2011
Dykstra, 2011, Understanding issues in cloud forensics: two hypothetical case studies, 191
Dykstra, 2011, Understanding issues in cloud forensics: two hypothetical case studies, Journal of Network Forensics, 3, 19
Eucalyptus, 2011
Federal CIO Council, 2011
Garfinkel, 2006, Forensic feature extraction and cross-drive analysis, Digital Investigation, 3, 71, 10.1016/j.diin.2006.06.007
Garfinkel, 2003, A virtual machine introspection based architecture for intrusion detection, 191
Giobbi, 2007
Guidance Software, 2011, EnCase Legal Journal
Heiser, 2009
Krautheim FJ. Building trust into utility cloud computing. Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland; 2010.
Krautheim, 2010, Trusted virtual environment module: managing trust in cloud computing, 211
LibVMI, 2011
Nance, 2009, Investigating the implications of virtual machine introspection for digital forensics, 1024
National Institute of Standards and Technology, 2003
National Institute of Standards and Technology, 2004
National Institute of Standards and Technology, 2008
National Institute of Standards and Technology, 2009
National Institute of Standards and Technology, 2011
Ruan, 2011, Cloud forensics: an overview
Santana, 2009
Santos, 2009, Towards trusted cloud computing
Sato, 2010, A cloud trust model in a security aware cloud, 121
SCMagazine, 2011, Best computer forensic tool, SCMagazine
Shields, 2011, A system for the proactive, continuous, and efficient collection of digital forensic evidence, vol. 8, S3
Taylor, 2011, Forensic investigation of cloud computing systems, Network Security, 2011, 4, 10.1016/S1353-4858(11)70024-1
Terremark, 2009
United States Code, 1994