D:C-8.2 Framework of Evidence

[1]  Linda Volonino Electronic Evidence and Computer Forensics , 2003, Commun. Assoc. Inf. Syst..

[2]  Tom Killalea,et al.  Guidelines for Evidence Collection and Archiving , 2002, RFC.

[3]  John Zic,et al.  Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.

[4]  Yang Xiao,et al.  A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.

[5]  Rebecca T. Mercuri A better ballot box , 2002 .

[6]  P.D. Dixon,et al.  An overview of computer forensics , 2005, IEEE Potentials.

[7]  Martin Gilje Jaatun,et al.  Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[8]  Chen Wang,et al.  A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable , 2010, HotCloud.

[9]  Jian Feng Zhang,et al.  Provable Data Possession in Cloud Computing , 2014 .

[10]  Gary C. Kessler Advancing the Science of Digital Forensics , 2012, Computer.

[11]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[12]  Kent E. Seamons,et al.  Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..

[13]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[14]  Eoghan Casey Error, Uncertainty and Loss in Digital Evidence , 2002, Int. J. Digit. EVid..

[15]  Dan S. Wallach,et al.  Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.

[16]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.