Dropbox analysis: Data remnants on user machines

Digital Investigation - Tập 10 Số 1 - Trang 3-18 - 2013
Darren Quick1, Kim‐Kwang Raymond Choo1
1Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes Campus, Mawson Lakes Boulevard, Mawson Lakes SA 5095, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Association of Chief Police Officers (ACPO), 2006

Australian Government Information Management Office (AGIMO), 2011

Architecture Technologies, 2011

Bartholomew, 2009, Cloud rains opportunities for software developers, Dice

Birk, 2011, Technical issues of forensic investigations in cloud computing environments, 1

Bogatin, 2006

Desisto, 2008

Gantz, 2012

Hooper C, Martini B, Choo KKR. ‘Cloud computing and its implications for cybercrime investigations in Australia’. Computer Law and Security Review, in press, http://dx.doi.org/10.1016/j.clsr.2013.01.006.

Kaufman, 2009, Data security in the world of cloud computing, IEEE Security & Privacy, 61, 10.1109/MSP.2009.87

Kisswani, 2010, Telecommunications (interception and access) and its regulation in Arab countries, Journal of International Commercial Law and Technology, 5, 225

MagnetSoftware, 2013

McClain, 2011

McKemmish, 1999, What is forensic computing?, Trends and Issues in Crime and Criminal Justice, 118, 1

Mell, 2011

National Institute of Justice (NIJ), 2004

National Institute of Justice (NIJ), 2008

National Institute of Standards and Technology (NIST), 2011

Pallaras, 2011, New technology: opportunities and challenges for prosecutors, Crime, Law and Social Change, 56, 71, 10.1007/s10611-011-9300-y

Quick D, Choo KKR. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems, in press, http://dx.doi.org/10.1016/j.future.2013.02.001.

Russinovich, 2012

Slay, 2009, Towards a formalization of digital forensics, 37

Taylor, 2011, Forensic investigation of cloud computing systems, Network Security, 3, 4, 10.1016/S1353-4858(11)70024-1

USDoD, 1995

Zatyko, 2011, The digital forensics cyber exchange principle, Forensic Magazine, 13