Digital Evidence Management, Presentation, and Court Preparation in the Cloud

[1]  Martin Bichler,et al.  Knowledge representation concepts for automated SLA management , 2006, Decis. Support Syst..

[2]  Ralph Grishman,et al.  Information Extraction: Techniques and Challenges , 1997, SCIE.

[3]  Zainuddin Hassan,et al.  COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .

[4]  Tahar Kechadi,et al.  Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis , 2011 .

[5]  Mark Pollitt,et al.  An Ad Hoc Review of Digital Forensic Models , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).

[6]  Mohand Tahar Kechadi,et al.  Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.

[7]  Ian T. Foster,et al.  SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems , 2002, JSSPP.

[8]  Frank Leymann,et al.  Aggregation of Service Level Agreements in the Context of Business Processes , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[9]  James Plunkett,et al.  Digital Forensic Investigations in the Cloud: A Proposed Approach for Irish Law Enforcement , 2015 .

[10]  Mitchel Stengel,et al.  Best Practices for Teaching Discussion as Part of High School Common Core State Standards , 2019, Journal of Communication Pedagogy.

[11]  Nhien-An Le-Khac,et al.  Forensic framework to identify local vs synced artefacts , 2018, Digit. Investig..

[12]  Alan T. Sherman,et al.  Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..

[13]  Geoffrey Ford Service level agreements , 1996 .

[14]  Alan T. Sherman,et al.  Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .

[15]  Christos Ilioudis,et al.  The Importance of Corporate Forensic Readiness in the Information Security Framework , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[16]  Issa Traoré,et al.  The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review , 2011, ISA.

[17]  Deborah A. Frincke,et al.  A Theoretical Framework for Organizational Network Forensic Readiness , 2007, J. Comput..

[18]  Hein S. Venter,et al.  Towards a Digital Forensic Readiness Framework for Public Key Infrastructure systems , 2011, 2011 Information Security for South Africa.

[19]  Hein S. Venter,et al.  The architecture of a digital forensic readiness management system , 2013, Comput. Secur..

[20]  Salman Baset,et al.  Cloud SLAs: present and future , 2012, OPSR.

[21]  Robert Rowlingson,et al.  A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..

[22]  M. Tahar Kechadi,et al.  Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..

[23]  Hein S. Venter,et al.  Digital forensic readiness in the cloud , 2013, 2013 Information Security for South Africa.

[24]  Nhien-An Le-Khac,et al.  The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[25]  Buks Louwrens,et al.  Digital Forensic Readiness as a Component of Information Security Best Practice , 2007, SEC.

[26]  Ankit Agarwal,et al.  Systematic Digital Forensic Investigation Model , 2011 .

[27]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[28]  Muhammad Faheem,et al.  The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends , 2015, Int. J. Digit. Crime Forensics.

[29]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[30]  Joe Carthy,et al.  Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis , 2012, ICDF2C.

[31]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[32]  John A. N. Lee,et al.  The beginnings at MIT , 1992, IEEE Annals of the History of Computing.