Legal Process and Requirements for Cloud Forensic Investigations
暂无分享,去创建一个
Barbara Endicott-Popovsky | Aaron Alva | Ivan Orton | B. Endicott-Popovsky | Aaron Alva | I. Orton | Ivan Orton
[1] Vasilios Katos,et al. Requirements for a Forensically Ready Cloud Storage Service , 2011, Int. J. Digit. Crime Forensics.
[2] Stephen D. Wolthusen,et al. Overcast: Forensic Discovery in Cloud Environments , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.
[3] Tahar Kechadi,et al. Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis , 2011 .
[4] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[5] Bernd Grobauer,et al. Towards incident handling in the cloud: challenges and approaches , 2010, CCSW '10.
[6] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[7] Roderic Broadhurst,et al. Developments in the global law enforcement of cyber‐crime , 2006 .
[8] Marcus K. Rogers,et al. A Survey of the Legal Issues Facing Digital Forensic Experts , 2009, IFIP Int. Conf. Digital Forensics.
[9] Michael Losavio. The law of possession of digital objects: dominion and control issues for digital forensics investigations and prosecutions , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).
[10] Abbes Amira,et al. Mobile Video Cloud Networks , 2014 .
[11] Wayne R. LaFave. Search and seizure : a treatise on the fourth amendment , 1980 .
[12] Wolfgang Frey,et al. Synthesis of an Optically Active Decahydro-6-isoquinolone Scaffold with a Quaternary Stereocenter , 2004 .
[13] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[14] David A. Couillard. Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing , 2009 .
[15] Thomas Kappeler,et al. A note on gaps of Hill's equation , 2004 .
[16] Fawzy Soliman,et al. Sustainable Business Transformation in Supply Chains , 2014, Web Services.
[17] E. Alvord,et al. Pathology of Tumours of the Nervous System, Ed. 4, Dorothy S. Russell, Lucien J. Rubinstein. The Williams & Wilkins Co., Baltimore (1977), 331 illustrations, 448 pages. $50.00. , 1978 .
[18] Orin S. Kerr. The Case for the Third-Party Doctrine , 2008 .
[19] Taesung Park,et al. Testing for ordered group effects with repeated measurements , 1996 .
[20] N. Brody,et al. Of what are we aware? , 1994, Behavioral and Brain Sciences.
[21] Margaret A. Berger,et al. Weinstein's Evidence: Commentary on Rules of Evidence for the United States Courts and Magistrates (& Supp., 1975- ) , 1975 .
[22] F S Cohen,et al. Methodologies in the study of cell-cell fusion. , 1998, Methods.
[23] Joel J. P. C. Rodrigues,et al. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , 2013 .
[24] Paul R. Rice. Electronic Evidence: Law and Practice , 2005 .
[25] Barbara Endicott-Popovsky,et al. On the Creation of Reliable Digital Evidence , 2012, IFIP Int. Conf. Digital Forensics.
[26] Barbara Endicott-Popovsky,et al. Digital Evidence Education in Schools of Law , 2012, J. Digit. Forensics Secur. Law.
[27] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[28] M P Davis,et al. There and back again. Lung cancer screening. , 1997, Chest.
[29] Barbara Endicott-Popovsky,et al. Unintended Consequences: Digital Evidence in Our Legal System , 2012, IEEE Security & Privacy.
[30] ChengYan. Cybercrime forensic system in cloud computing , 2011 .
[31] R. F. Murphy. Radioimmunoassay in Clinical Biochemistry , 1977 .
[32] William Jeremy Robison,et al. Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act , 2010 .
[33] Mark John Taylor,et al. Forensic investigation of cloud computing systems , 2011, Netw. Secur..
[34] F. Grosse,et al. Accuracy of DNA polymerase‐alpha in copying natural DNA. , 1983, The EMBO journal.
[35] Orin S. Kerr. Applying the Fourth Amendment to the Internet: A General Approach , 2009 .
[36] Mark Taylor,et al. Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..
[37] Mark Pollitt,et al. Digital Forensics: Operational, Legal, and Research Issues , 2003, DBSec.