A digital evidence protection method with hierarchical access control mechanisms
暂无分享,去创建一个
[1] Eoghan Casey,et al. Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .
[2] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[3] F. Kuo,et al. Cryptographic key assignment scheme for dynamic access control in a user hierarchy , 1999 .
[4] Deniz Sinangin. Computer Forensics Investigations in a Corporate Environment , 2002 .
[5] Kelly J. Kuchta. Computer Forensics Today , 2000, Inf. Secur. J. A Glob. Perspect..
[6] Victor R. L. Shen,et al. A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations , 2002, Comput. Secur..
[7] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[8] Albert Marcella,et al. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .
[9] Kelly J. Kuchta. Forensic Fieldwork: Experience Is the Best Teacher , 2002, Inf. Secur. J. A Glob. Perspect..
[10] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[11] R. Jones,et al. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 2003, Int. J. Law Inf. Technol..
[12] Chin-Chen Chang,et al. Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..