Difference between pages "Upcoming events" and "Cloud Forensics Bibliography"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Calls For Papers)
 
 
Line 1: Line 1:
Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.
+
'''In chronological order, oldest to most recent'''
  
<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>
+
<bibtex>
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
@article{Dykstra12,
<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>
+
author = "Josiah Dykstra and Alan T. Sherman",
 +
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
 +
journal = "Digital Investigation",
 +
volume = {9},
 +
year = {2012},
 +
pages = {S90--S98},
 +
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 +
</bibtex>
  
== Calls For Papers ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@inproceedings{ISSA,
|- style="background:#bfbfbf; font-weight: bold"
+
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
! Title
+
title = "Isolating a cloud instance for a digital forensic investigation",
! Due Date
+
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
! Website
+
  year={August 2011},
|-
+
  organization={ISSA},
|First Annual European DeepSec In-Depth Security Conference
+
</bibtex>
|Jun 10, 2007
+
|http://deepsec.net/cfp/
+
|-
+
|DFRWS 2007 File Carving Challenge
+
|Jul 09, 2007
+
|http://www.dfrws.org/2007/challenge/submission.html
+
|-
+
|American Academy of Forensic Sciences Annual Meeting
+
|Aug 01, 2007
+
|http://www.aafs.org/abstracts/your_online_presentation_submiss.htm
+
|-
+
|Digital Forensic Forum Prague 2007
+
|Aug 31, 2007
+
|http://www.dff-prague.com/News/article/sid=17.html
+
|}
+
  
== Conferences ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{CLSR,
|- style="background:#bfbfbf; font-weight: bold"
+
author = "Esther George and Stephen Mason",
! Title
+
title = "Digital evidence and ‘cloud’ computing",
! Date/Location
+
journal = "Computer Law & Security Review",
! Website
+
volume = {27},
|-
+
issue = {5},
|2007 Techno-Security Conference
+
year = {September 2011},
|Jun 03-06, Myrtle Beach, SC
+
pages = {524--528}
|http://www.techsec.com/html/Techno2007.html
+
</bibtex>
|-
+
|Computer Security Institute NetSec '07
+
|Jun 11-13, Scottsdale, AZ
+
|http://www.gocsi.com/netsec/
+
|-
+
|2007 USENIX Annual Technical Conference
+
|Jun 17-22, Santa Clara, CA
+
|http://www.usenix.org/events/
+
|-
+
|Third Government Forum of Incident Response and Security Teams Conference
+
|Jun 25-29, Orlando, FL
+
|http://www.us-cert.gov/GFIRST/index.html
+
|-
+
|First International Workshop on Cyber-Fraud
+
|Jul 01-06, San Jose, CA
+
|http://www.iaria.org/conferences2007/CYBERFRAUD.html
+
|-
+
|Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2007
+
|Jul 12-13, Lucerne, Switzerland
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/
+
|-
+
|BlackHat Briefings
+
|Jul 28-Aug 02, Las Vegas, NV
+
|http://www.blackhat.com/html/bh-link/briefings.html
+
|-
+
|DefCon
+
|Aug 03-05, Las Vegas, NV
+
|http://www.defcon.org/
+
|-
+
|16th USENIX Security Symposium
+
|Aug 06-10, Boston, MA
+
|http://www.usenix.org/events/
+
|-
+
|GMU 2007 Symposium
+
|Aug 06-10, George Mason University, Fairfax, VA
+
|http://www.rcfg.org
+
|-
+
|[[Digital Forensic Research Workshop|Digital Forensic Research Workshop 2007]]
+
|Aug 13-15, Pittsburgh, PA
+
|http://www.dfrws.org/2007/index.html
+
|-
+
|HTCIA 2007 International Training Conference & Exposition
+
|Aug 27-29, San Diego, CA
+
|http://www.htcia-sd.org/htcia2007.html
+
|-
+
|Recent Advances in Intrusion Detection (RAID) 2007
+
|Sep 05-07, Gold Coast, Queensland, Australia
+
|http://www.isi.qut.edu.au/events/conferences/raid07
+
|-
+
|14th International Conference on Image Analysis and Processing (ICIAP 2007)
+
|Sep 10-14, Modena, Italy
+
|http://www.iciap2007.org
+
|-
+
|3rd International Conference on IT-Incident Management & IT-Forensics
+
|Sep 11-12, Stuttgart, Germany
+
|http://www.imf-conference.org/
+
|-
+
|Black and White Ball
+
|Sep 25-28, London, UK
+
|http://www.theblackandwhiteball.co.uk/
+
|-
+
|BlackHat Japan - Briefings
+
|Oct 23-26, Tokyo, Japan
+
|http://www.blackhat.com/html/bh-japan-07/bh-jp-07-main.html
+
|-
+
|Techno-Forensics Conference
+
|Oct 29 - 31, Rockville, MD
+
|http://www.techsec.com/html/TechnoForensics2007.html
+
|-
+
|DeepSec IDSC
+
|Nov 22-24, Vienna, Austria
+
|http://deepsec.net/
+
|-
+
|Digital Forensic Forum Prague 2007
+
|Nov 26-27, Prague, Czech Republic
+
|http://www.dff-prague.com/
+
|-
+
|DoD Cyber Crime Conference 2008
+
|Jan 13-18 2008, St. Louis, MO
+
|http://www.dodcybercrime.com/
+
|-
+
|AAFS Annual Meeting
+
|Feb 18-23 2008, Washington, DC
+
|http://aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|}
+
  
== On-going / Continuous Training ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{dykstraJournal,
|- style="background:#bfbfbf; font-weight: bold"
+
  author = "Josiah Dykstra and Alan. T. Sherman",
! Title
+
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
! Date/Location or Venue
+
  journal ={Journal of Network Forensics},
! Website
+
  volume = {3},
|-
+
  number = {1},
|Basic Computer Examiner Course
+
  year = {Autumn, 2011},
|Computer Forensic Training Online
+
  pages = {19--31}
|http://www.cftco.com
+
}
|-
+
</bibtex>
|MaresWare Suite Training
+
|First full week every month, Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|Evidence Recovery for Windows Vista&trade;
+
|First full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows Server&reg; 2003 Release 2 operating system
+
|Second full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows XP&trade; operating system
+
|Third full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|}
+
  
== Scheduled Training Courses ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{ruan,
|- style="background:#bfbfbf; font-weight: bold"
+
  title="Cloud forensics: An overview",
! Title
+
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
! Date/Location
+
  booktitle={Advances in Digital Forensics VII},
! Website
+
  year={2011},
! Limitation
+
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
|-
+
}
|SMART for Linux
+
 
|Jun 04-07, Austin, TX
+
</bibtex>
|http://asrdata.com/training/training2.html
+
<bibtex>
|-
+
 
|AccessData BootCamp
+
@inproceedings{ruanSurvey,
|Jun 05-07, Albuquerque, NM
+
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
|http://www.accessdata.com/training
+
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
|-
+
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
|Advanced Data Forensics Topics
+
  year={2011},
|Jun 11-13, Austin, TX
+
  organization={ADFSL},
|http://asrdata.com/training/training2.html
+
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
|-
+
}
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
</bibtex>
|Jun 11-22, FLETC, Glynco, GA
+
 
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
<bibtex>
|Limited to Law Enforcement
+
@article{CloudForensics,
|-
+
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
|Helix Live Forensics and Incident Response Course
+
  title = {Forensic investigation of cloud computing systems},
|Jun 12-14, SEARCH - Sacramento, CA
+
  journal ={Network Security},
|https://www.e-fense.com/register.php
+
  volume = {2011},
|-
+
  number = {3},
|AccessData Internet Forensics
+
  year = {2011},
|Jun 12-14 , Boise, ID
+
  pages = {4--10},
|http://www.accessdata.com/training
+
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
|-
+
}
|AccessData Windows Forensics
+
 
|Jun 19-21, Dallas, TX
+
</bibtex>
|http://www.accessdata.com/training
+
<bibtex>
|-
+
 
|SMART for Linux
+
@inproceedings{birk,
|Jul 09-12, Austin, TX
+
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
|http://asrdata.com/training/training2.html
+
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
|-
+
  author={Dominik Birk and Christoph Wegener},
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
  year={2011},
|Jul 09-13, FLETC, Glynco, GA
+
  organization={IEEE},
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
  address = {Oakland, CA, USA},
|Limited to Law Enforcement
+
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
|-
+
}
|SMART Windows Data Forensics
+
 
|Jul 16-18, Austin, TX
+
</bibtex>
|http://asrdata.com/training/training2.html
+
 
|-
+
<bibtex>
|Seized Computer Evidence Recovery Specialist (SCERS)
+
@article{Araiza11,
|Jul 16-27, FLETC, Glynco, GA
+
  title="Electronic Discovery in the Cloud",
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
  author={Alberto G. Araiza},
|Limited to Law Enforcement
+
  journal={Duke Law and Technology Review},
|-
+
  volume = {8},
|AccessData BootCamp
+
  year = {2011},
|Jul 17-19, Boise, ID
+
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
|http://www.accessdata.com/training
+
}
|-
+
</bibtex>
|AccessData Windows Forensics
+
 
|Jul 24-26, Albuquerque, NM
+
<bibtex>
|http://www.accessdata.com/training
+
@article{Cross10,
|-
+
  title="E-Discovery and Cloud Computing: Control of ESI in the Cloud",
|Network Forensics and Investigations Workshop
+
  author={David D. Cross and Emily Kuwahara},
|Jul 25-27, Washington, DC
+
  journal={EDDE Journal},
|http://www.strozllc.com/trainingcenter/
+
  volume = {1},
|-
+
  number = {2},
|First Responder to Digital Evidence Program (FRDE)
+
  year = {2010},
|Jul 31-Aug 02, FLETC, Glynco, GA
+
  pages = {2--12},
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
|Limited to Law Enforcement
+
}
|-
+
</bibtex>
|SARC Steganography Examiner Training
+
 
|Aug 04 - 05, Fairfax, VA (RCFG/GMU Conference 2007)
+
<bibtex>
|http://www.sarc-wv.com/training.aspx
+
@book{Lil10,
|-
+
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
|SMART for Linux
+
  author={Terrance V. Lillard},
|Aug 06-09, Austin, TX
+
  year={2010},
|http://asrdata.com/training/training2.html
+
  publisher={Syngress},
|-
+
}
|X-Ways Forensics
+
</bibtex>
|Aug 6-8, Seattle, WA
+
 
|http://www.x-ways.net/training/seattle.html
+
<bibtex>
|-
+
@inproceedings{Lu10,
|File Systems Revealed
+
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
|Aug 9-10, Seattle, WA
+
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
|http://www.x-ways.net/training/seattle.html
+
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
|-
+
  pages={282--292},
|Computer Network Investigations Training Program (CNITP)
+
  year={2010},
|Aug 14-24, FLETC, Glynco, GA
+
  address={New York, NY, USA},
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
  organization={ACM},
|Limited to Law Enforcement
+
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
|-
+
}
|SMART Linux Data Forensics
+
 
|Aug 13-15, Austin, TX
+
</bibtex>
|http://asrdata.com/training/training2.html
+
 
|-
+
<bibtex>
|Network Forensics and Investigations Workshop
+
 
|Aug 13-15, Los Angeles, CA
+
@inproceedings{Wol09,
|http://www.strozllc.com/trainingcenter/
+
  title="Overcast: Forensic Discovery in Cloud Environments",
|-
+
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
|Macintosh Forensic Survival Course
+
  author={Stephen D. Wolthusen},
|Aug 13-17, Fredricksburg, VA
+
  pages={3--9},
|http://www.phoenixdatagroup.com/cart/index.php
+
  year={2009},
|-
+
  address={Washington, DC, USA},
|AccessData Internet Forensics
+
  organization={IEEE Computer Society}
|Aug 14-16 , Austin, TX
+
}
|http://www.accessdata.com/training
+
 
|-
+
</bibtex>
|Helix Live Forensics and Incident Response Course
+
 
|Aug 28-30, Tennessee Bureau of Investigations - Nashville, TN
+
 
|https://www.e-fense.com/register.php
+
 
|-
+
[[Category:Bibliographies]]
|SMART for Linux
+
|Sep 03-06, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Sep 11-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Applied Decryption
+
|Sep 11-13, Dallas, TX
+
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|Sep 17-19, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Macintosh Forensic Survival Course
+
|Sep 24-28, Santa Ana, CA
+
|http://www.phoenixdatagroup.com/cart/index.php
+
|-
+
|AccessData Applied Decryption
+
|Sep 25-27, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Sep 25-27, Solna, SE
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|Oct 01-04, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART Windows Data Forensics
+
|Oct 08-10, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|X-Ways Forensics
+
|Oct 22-24, Hong Kong
+
|http://www.x-ways.net/training/hong_kong.html
+
|-
+
|File Systems Revealed
+
|Oct 25-26, Hong Kong
+
|http://www.x-ways.net/training/hong_kong.html
+
|-
+
|SARC Steganography Examiner Training
+
|Oct 26 - 27, Gaithersburg, MD (Techno Forensics Conference 2007)
+
|http://www.sarc-wv.com/training.aspx
+
|-
+
|SMART for Linux
+
|Nov 05-08, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Nov 06-08, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Nov 06-08, Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|SMART Linux Data Forensics
+
|Nov 12-14, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART for Linux
+
|Dec 03-06, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Internet Forensics
+
|Dec 04-06 , Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|Dec 10-12, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|}
+

Revision as of 10:43, 27 June 2012

In chronological order, oldest to most recent

Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Digital Investigation 9:S90--S98,2012
http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
Bibtex
Author : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012

Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
Bibtex
Author : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011

Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
Computer Law & Security Review 27:524--528,September 2011
Bibtex
Author : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011

Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Journal of Network Forensics 3(1):19--31,Autumn, 2011
Bibtex
Author : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
,2011
http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
Bibtex
Author : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011

Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
Bibtex
Author : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011

Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
Network Security 2011(3):4--10,2011
http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
Bibtex
Author : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011

Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
Bibtex
Author : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011

Alberto G. Araiza - Electronic Discovery in the Cloud
Duke Law and Technology Review 8,2011
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
Bibtex
Author : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011

David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
EDDE Journal 1(2):2--12,2010
http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
Bibtex
Author : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010

Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Syngress,2010
Bibtex
Author : Terrance V. Lillard
Title : Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
In : -
Address :
Date : 2010

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
Bibtex
Author : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010

Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
Bibtex
Author : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009