Difference between pages "Upcoming events" and "Cloud Forensics Bibliography"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Calls For Papers)
 
 
Line 1: Line 1:
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
+
'''In chronological order, oldest to most recent'''
Events should be posted in the correct section, and in date order.  An event should NEVER be listed in more than one section (i.e. Ongoing/Continuous events should not be listed in Scheduled Training).  When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. If a provider offers the same event at several locations simultaneously, the listing should have a single (ONE) entry in the list with the date(s) and ALL locations for the event. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
+
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
+
  
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activitiesSome events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
+
<bibtex>
 +
@article{Dykstra12,
 +
author = "Josiah Dykstra and Alan T. Sherman",
 +
  title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
 +
journal = "Digital Investigation",
 +
volume = {9},
 +
year = {2012},
 +
pages = {S90--S98},
 +
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 +
</bibtex>
  
This listing is divided into four sections (described as follows):<br>
+
<bibtex>
<ol><li><b><u>Calls For Papers</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
+
@inproceedings{ISSA,
<li><b><u>Conferences</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
+
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
<li><b><u>On-Going / Continuous Training</u></b> - Training opportunities that are either always available online/distance learning format (start anytime) or that are offered the same time every month (Name, date-if applicable, URL)</li><br>
+
title = "Isolating a cloud instance for a digital forensic investigation",
<li><b><u>[[Scheduled Training Courses]]</u></b> - Training Classes/Courses that are scheduled for specific dates/locations.  This would include online (or distance learning format) courses which begin on specific dates, instead of the "start anytime" courses listed in the previous section. (Provider, URL) (''note: this has been moved to its own page.'')<br></li></ol>
+
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
 +
  year={August 2011},
 +
  organization={ISSA},
 +
</bibtex>
  
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multimedia Sciences Section Listserv.  
+
<bibtex>
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
@article{CLSR,
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
+
author = "Esther George and Stephen Mason",
 +
title = "Digital evidence and ‘cloud’ computing",
 +
  journal = "Computer Law & Security Review",
 +
volume = {27},
 +
issue = {5},
 +
year = {September 2011},
 +
pages = {524--528}
 +
</bibtex>
  
== Calls For Papers ==
+
<bibtex>
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
+
@article{dykstraJournal,
 +
  author = "Josiah Dykstra and Alan. T. Sherman",
 +
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
 +
  journal ={Journal of Network Forensics},
 +
  volume = {3},
 +
  number = {1},
 +
  year = {Autumn, 2011},
 +
  pages = {19--31}
 +
}
 +
</bibtex>
  
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
<bibtex>
|- style="background:#bfbfbf; font-weight: bold"
+
@article{ruan,
! width="30%|Title
+
  title="Cloud forensics: An overview",
! width="15%"|Due Date
+
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
! width="15%"|Notification Date
+
  booktitle={Advances in Digital Forensics VII},
! width="40%"|Website
+
  year={2011},
|-
+
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
|1st International Workshop on Managing Insider Security Threats
+
}
|Mar 22, 2009
+
|Apr 20, 2009
+
|http://isyou.hosting.paran.com/mist09/data/MIST09-CFP.pdf
+
|-
+
|Systematic Approaches to Digital Forensic Engineering International Workshop
+
|Mar 25, 2009
+
|Apr 15, 2009
+
|http://conf.ncku.edu.tw/sadfe/sadfe09/cfp.html
+
|-
+
|Layer One - 2009
+
|Apr 01, 2009
+
|Apr 15, 2009
+
|http://layerone.info/
+
|-
+
|Recent Advances in Intrusion Detection (RAID) International Symposium
+
|Apr 05, 2009
+
|Jun 08, 2009
+
|http://www.rennes.supelec.fr/RAID2009/cfp.html
+
|-
+
|ACM CCS 2009
+
|Apr 20, 2009
+
|Jul 12, 2009
+
|http://www.sigsac.org/ccs/CCS2009/cfp.shtml
+
|-
+
|3rd International Workshop on Computational Forensics
+
|Apr 24, 2009
+
|May 22, 2009
+
|http://iwcf09.arsforensica.org/
+
|-
+
|ICDF2C 2009
+
|Apr 30, 2009
+
|Jun 30, 2009
+
|http://www.d-forensics.org/
+
|-
+
|Usenix Lisa 2009
+
|Apr 30, 2009
+
|Jul 07, 2009
+
|http://www.usenix.org/events/lisa09/cfp/
+
|-
+
|New Security Paradigms Conference 2009
+
|Apr 2009
+
|
+
|http://www.nspw.org/current/
+
|-
+
|International Workshop on Information Forensics and Security (WIFS)
+
|May 22, 2009
+
|Aug 21, 2009
+
|http://www.wifs09.org/index.php?option=com_content&view=article&id=15&Itemid=42
+
|-
+
|ACSAC 25
+
|Jun 01, 2009
+
|Aug 17, 2009
+
|http://www.acsac.org
+
|-
+
|IMF 2009
+
|Jun 01, 2009
+
|Jul 22, 2009
+
|http://www.imf-conference.org/
+
|-
+
|American Academy of Forensic Sciences 2010 Annual Meeting
+
|Aug 01, 2009
+
|Nov, 2009
+
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|IEEE Symposium on Security and Privacy 2010
+
|Nov 2009
+
|
+
|-
+
|ShmooCon 2010
+
|Dec 2009
+
|Jan 2010
+
|http://www.shmoocon.org/cfp.html
+
|-
+
|AusCERT Conference 2010
+
|Dec 2009
+
|Jan 2010
+
|http://conference.auscert.org.au/conf2010/cfp2010.html
+
|-
+
  
|}
+
</bibtex>
 +
<bibtex>
  
== Conferences ==
+
@inproceedings{ruanSurvey,
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
|- style="background:#bfbfbf; font-weight: bold"
+
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
! width="40%"|Title
+
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
! width="20%"|Date/Location
+
  year={2011},
! width="40%"|Website
+
  organization={ADFSL},
|-
+
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
|5th Cyber Security and Information Intelligence Research Workshop
+
}
|Apr 13-15<br>Oak Ridge National Laboratory, TN
+
</bibtex>
|http://www.csiir.ornl.gov/csiirw/
+
|-
+
|Blackhat Europe
+
|Apr 14-17<br>Amsterdam, The Netherlands
+
|https://www.blackhat.com/html/bh-europe-09/bh-eu-09-main.html
+
|-
+
|IEEE Canadian Conference on Electrical and Computer Engineering(CCECE 2009)
+
|May 03-06<br>St. John's, Newfoundland & Labrador, Canada
+
|http://www.ieee.ca/ccece09/index_en.php
+
|-
+
|Ohio HTCIA Spring Training Conference
+
|May 12-14<br>Kirtland, OH
+
|http://ohiohtcia.org/conference.html
+
|-
+
|AusCERT2009
+
|May 17-22<br>Gold Coast, Australia
+
|http://conference.auscert.org.au/conf2009/
+
|-
+
|Computer Security Institute: Security Exchange
+
|May 17-22<br>Las Vegas, NV
+
|http://www.csisx.com/
+
|-
+
|ADFSL 2009 Conference on Digital Forensics, Security and Law
+
|May 20-22<br>Burlington, VT
+
|http://www.digitalforensics-conference.org
+
|-
+
|Fourth International Workshop on Systematic Approaches to Digital Forensic Engineering (co-located with IEEE Security & Privacy)
+
|May 21<br>Oakland, CA
+
|http://conf.ncku.edu.tw/sadfe/sadfe09/
+
|-
+
|LayerOne 2009 Security Conference
+
|May 23-24<br>Anaheim, CA
+
|http://layerone.info/
+
|-
+
|Mobile Forensics World 2009
+
|May 26-30<br>Chicago, IL
+
|http://www.mobileforensicsworld.com
+
|-
+
|2009 Techno Security Conference
+
|May 31-Jun 03<br>Myrtle Beach, SC
+
|http://www.techsec.com/index.html
+
|-
+
|USENIX 2009
+
|Jun 14-19<br>San Diego, CA
+
|http://www.usenix.org/events/usenix09/
+
|-
+
|IEEE ICC Communication and Information Systems Security (CISS) Symposium
+
|Jun 14-18<br>Dresden, Germany
+
|http://www.ieee-icc.org/2009/
+
|-
+
|1st International Workshop on Managing Insider Security Threats
+
|Jun 15-19<br>Purdue University, IN
+
|http://isyou.hosting.paran.com/mist09/
+
|-
+
|SANS SANSFIRE 2009
+
|Jun 13-22<br>Baltimore, MD
+
|http://www.sans.org/sansfire09/
+
|-
+
|1st Workshop on Internet Multimedia Search and Mining (IMSM'09)
+
|Jul 03<br>Cancun, Mexico
+
|http://research.microsoft.com/en-us/um/people/xshua/imsm/index.html
+
|-
+
|Blackhat USA 2009
+
|Jul 25-30<br>Las Vegas, NV
+
|https://www.blackhat.com/
+
|-
+
|DefCon 17
+
|Jul 31-Aug 02<br>Las Vegas, NV
+
|http://www.defcon.org/
+
|-
+
|Usenix Security Sypmosium
+
|Aug 10-14<br>Montreal, Quebec, Canada
+
|http://www.usenix.org/events/sec09/
+
|-
+
|3rd International Workshop on Computational Forensics
+
|Aug 13-14<br>The Hague, The Netherlands
+
|http://iwcf09.arsforensica.org/
+
|-
+
|Digital Forensic Research Workshop
+
|Aug 17-19<br>Montreal, Quebec, Canada
+
|http://www.dfrws.org
+
|-
+
|Triennial Meeting of the European Academy of Forensic Science
+
|Sep 08-11<br>Glasgow, Scotland, UK
+
|http://www.eafs2009.com/
+
|-
+
|IMF 2009
+
|Sep 15-17<br>Stuttgart, Germany
+
|http://imf-conference.org/
+
|-
+
|Hacker Halted USA 2009
+
|Sep 20-24<br>Miami, FL
+
|http://www.hackerhalted.com
+
|-
+
|Recent Advances in Intrusion Detection (RAID) International Symposium
+
|Sep 23-25<br>Saint-Malo, Brittany, France
+
|http://www.rennes.supelec.fr/RAID2009/index.html
+
|-
+
|The 1st International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
+
|Sep 30 - October 02<br>Albany, NY
+
|http://www.d-forensics.org/
+
|-
+
|First IEEE Workshop on Information Forensics and Security
+
|Dec 06-09<br>London, England
+
|http://www.wifs09.org/
+
|-
+
|AAFS Annual Meeting
+
|Feb. 22-27<br>Seattle, WA
+
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|}
+
  
== On-going / Continuous Training ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{CloudForensics,
|- style="background:#bfbfbf; font-weight: bold"
+
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
! width="40%"|Title
+
  title = {Forensic investigation of cloud computing systems},
! width="20%"|Date/Location
+
  journal ={Network Security},
! width="40%"|Website
+
  volume = {2011},
|-
+
  number = {3},
|- style="background:pink;align:left"
+
  year = {2011},
! DISTANCE LEARNING
+
  pages = {4--10},
|-
+
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
|Basic Computer Examiner Course - Computer Forensic Training Online
+
}
|Distance Learning Format
+
|http://www.cftco.com
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|SANS On-Demand Training
+
|Distance Learning Format
+
|http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
+
|-
+
|Champlain College - CCE Course
+
|Online / Distance Learning Format
+
|http://extra.champlain.edu/cps/wdc/alliances/cce/landing/
+
|-
+
|Las Positas College
+
|Online Computer Forensics Courses
+
|http://www.laspositascollege.edu
+
|-
+
|- style="background:pink;align:left"
+
!RECURRING TRAINING
+
|-
+
|MaresWare Suite Training
+
|First full week every month<br>Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Evidence Recovery for Windows Vista&trade;
+
|First full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for Windows Server&reg; 2003 R2
+
|Second full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows XP&trade; operating system
+
|Third full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Computer Forensics Training and CCE&trade; Testing for Litigation Support Professionals
+
|Third weekend of every month(Fri-Mon)<br>Dallas, TX
+
|http://www.md5group.com
+
|-
+
|}
+
  
==See Also==
+
</bibtex>
* [[Scheduled Training Courses]]
+
<bibtex>
==References==
+
 
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
+
@inproceedings{birk,
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
+
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
+
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 +
  author={Dominik Birk and Christoph Wegener},
 +
  year={2011},
 +
  organization={IEEE},
 +
  address = {Oakland, CA, USA},
 +
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
 +
}
 +
 
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Araiza11,
 +
  title="Electronic Discovery in the Cloud",
 +
  author={Alberto G. Araiza},
 +
  journal={Duke Law and Technology Review},
 +
  volume = {8},
 +
  year = {2011},
 +
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Cross10,
 +
  title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
 +
  author={David D. Cross and Emily Kuwahara},
 +
  journal={EDDE Journal},
 +
  volume = {1},
 +
  number = {2},
 +
  year = {2010},
 +
  pages = {2--12},
 +
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@book{Lil10,
 +
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
 +
  author={Terrance V. Lillard},
 +
  year={2010},
 +
  publisher={Syngress},
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{Lu10,
 +
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
 +
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
 +
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
 +
  pages={282--292},
 +
  year={2010},
 +
  address={New York, NY, USA},
 +
  organization={ACM},
 +
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
 +
}
 +
 
 +
</bibtex>
 +
 
 +
<bibtex>
 +
 
 +
@inproceedings{Wol09,
 +
  title="Overcast: Forensic Discovery in Cloud Environments",
 +
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
 +
  author={Stephen D. Wolthusen},
 +
  pages={3--9},
 +
  year={2009},
 +
  address={Washington, DC, USA},
 +
  organization={IEEE Computer Society}
 +
}
 +
 
 +
</bibtex>
 +
 
 +
 
 +
 
 +
[[Category:Bibliographies]]

Revision as of 10:43, 27 June 2012

In chronological order, oldest to most recent

Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Digital Investigation 9:S90--S98,2012
http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
Bibtex
Author : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012

Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
Bibtex
Author : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011

Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
Computer Law & Security Review 27:524--528,September 2011
Bibtex
Author : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011

Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Journal of Network Forensics 3(1):19--31,Autumn, 2011
Bibtex
Author : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
,2011
http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
Bibtex
Author : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011

Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
Bibtex
Author : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011

Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
Network Security 2011(3):4--10,2011
http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
Bibtex
Author : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011

Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
Bibtex
Author : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011

Alberto G. Araiza - Electronic Discovery in the Cloud
Duke Law and Technology Review 8,2011
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
Bibtex
Author : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011

David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
EDDE Journal 1(2):2--12,2010
http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
Bibtex
Author : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010

Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Syngress,2010
Bibtex
Author : Terrance V. Lillard
Title : Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
In : -
Address :
Date : 2010

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
Bibtex
Author : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010

Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
Bibtex
Author : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009