Isolating Instances in Cloud Forensics
暂无分享,去创建一个
[1] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[2] F. Cohen. Digital Forensic Evidence Examination , 2009 .
[3] Sujeet Shenoi,et al. Advances in Digital Forensics VIII , 2012, IFIP Advances in Information and Communication Technology.
[4] Nena Lim,et al. Forensics of computers and handheld devices: identical or fraternal twins? , 2009, CACM.
[5] Martin S. Olivier,et al. Finding File Fragments in the Cloud , 2012, IFIP Int. Conf. Digital Forensics.
[6] Rini Mahajan,et al. Cloud Computing Issues , 2005 .
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Richard E. Overill,et al. Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations , 2011, IFIP Int. Conf. Digital Forensics.
[9] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[10] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[11] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[12] Carsten Binnig,et al. How is the weather tomorrow?: towards a benchmark for the cloud , 2009, DBTest '09.
[13] Emiliano Casalicchio,et al. Static and dynamic scheduling algorithms for scalable Web server farm , 2001, Proceedings Ninth Euromicro Workshop on Parallel and Distributed Processing.
[14] James R. Lyle,et al. A strategy for testing hardware write block devices , 2006, Digit. Investig..
[15] George Reese,et al. Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .
[16] Diane Barrett. Computer Networking Illuminated , 2005 .
[17] Mohand Tahar Kechadi,et al. Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.
[18] Mladen A. Vouk,et al. Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.
[19] Nitu,et al. Configurability in SaaS (software as a service) applications , 2009, ISEC '09.
[20] Nasir D. Memon,et al. Digital Forensics , 2009, IEEE Secur. Priv..