D:C-8.2 Framework of Evidence
暂无分享,去创建一个
Karin Bernsmed | Jean-Claude Royer | Tomasz Wiktor Wlodarczyk | Massimo Felici | Tobias Pulls | Christoph Reich | Jenni Reuben | Thomas Rübsamen | Rui Pais | Monir Azraoui
[1] Linda Volonino. Electronic Evidence and Computer Forensics , 2003, Commun. Assoc. Inf. Syst..
[2] Tom Killalea,et al. Guidelines for Evidence Collection and Archiving , 2002, RFC.
[3] John Zic,et al. Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.
[4] Yang Xiao,et al. A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.
[5] Rebecca T. Mercuri. A better ballot box , 2002 .
[6] P.D. Dixon,et al. An overview of computer forensics , 2005, IEEE Potentials.
[7] Martin Gilje Jaatun,et al. Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[8] Chen Wang,et al. A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable , 2010, HotCloud.
[9] Jian Feng Zhang,et al. Provable Data Possession in Cloud Computing , 2014 .
[10] Gary C. Kessler. Advancing the Science of Digital Forensics , 2012, Computer.
[11] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[12] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[13] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[14] Eoghan Casey. Error, Uncertainty and Loss in Digital Evidence , 2002, Int. J. Digit. EVid..
[15] Dan S. Wallach,et al. Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.
[16] Jeffrey S. Chase,et al. Strong accountability for network storage , 2007, TOS.