Cloud Authentication and Forensics

[1]  Ali Dehghantanha,et al.  SugarSync forensic analysis , 2016 .

[2]  Ali Dehghantanha,et al.  Ubuntu One investigation: Detecting evidences on client machines , 2015, The Cloud Security Ecosystem.

[3]  Stefanos Gritzalis,et al.  Cloud Forensics Solutions: A Review , 2014, CAiSE Workshops.

[4]  Kim-Kwang Raymond Choo,et al.  Google Drive: Forensic analysis of data remnants , 2014, J. Netw. Comput. Appl..

[5]  Anthony Keane,et al.  Digital forensics investigations in the Cloud , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[6]  Kim-Kwang Raymond Choo,et al.  Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? , 2013, Digit. Investig..

[7]  Kim-Kwang Raymond Choo,et al.  Digital droplets: Microsoft SkyDrive forensic data remnants , 2013, Future Gener. Comput. Syst..

[8]  M. Tahar Kechadi,et al.  Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..

[9]  Ragib Hasan,et al.  SecLaaS: secure logging-as-a-service for cloud forensics , 2013, ASIA CCS '13.

[10]  Ragib Hasan,et al.  Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems , 2013, ArXiv.

[11]  Shahrzad Zargari,et al.  Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.

[12]  Hein S. Venter,et al.  Digital Forensic Framework for a Cloud Environment , 2012 .

[13]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[14]  Stephen Mason,et al.  Digital evidence and 'cloud' computing , 2011, Comput. Law Secur. Rev..

[15]  Kun Zhang,et al.  A New Data Integrity Verification Mechanism for SaaS , 2010, WISM.

[16]  Mark Taylor,et al.  Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..

[17]  Yuliang Shi,et al.  Data Privacy Preserving Mechanism Based on Tenant Customization for SaaS , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[18]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[19]  Mahadev Satyanarayanan,et al.  Scalable, secure, and highly available distributed file access , 1990, Computer.

[20]  Simon Tjoa,et al.  Evidence and Cloud Computing: The Virtual Machine Introspection Approach , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[21]  Barbara Endicott-Popovsky,et al.  Legal Process and Requirements for Cloud Forensic Investigations , 2012 .

[22]  Mohand Tahar Kechadi,et al.  Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.

[23]  Ludwig Slusky,et al.  Cloud computing and computer forensics for business applications , 2009 .