Difference between pages "Upcoming events" and "Cloud Forensics Bibliography"
From ForensicsWiki
(Difference between pages)
(→Calls For Papers) |
|||
Line 1: | Line 1: | ||
− | + | '''In chronological order, oldest to most recent''' | |
− | + | ||
− | + | ||
− | + | <bibtex> | |
+ | @article{Dykstra12, | ||
+ | author = "Josiah Dykstra and Alan T. Sherman", | ||
+ | title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques", | ||
+ | journal = "Digital Investigation", | ||
+ | volume = {9}, | ||
+ | year = {2012}, | ||
+ | pages = {S90--S98}, | ||
+ | url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf" | ||
+ | </bibtex> | ||
− | + | <bibtex> | |
− | + | @inproceedings{ISSA, | |
− | + | author = "Waldo Delport and Michael Kohn and Martin S. Olivier", | |
− | + | title = "Isolating a cloud instance for a digital forensic investigation", | |
− | + | booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference}, | |
+ | year={August 2011}, | ||
+ | organization={ISSA}, | ||
+ | </bibtex> | ||
− | + | <bibtex> | |
− | + | @article{CLSR, | |
− | + | author = "Esther George and Stephen Mason", | |
+ | title = "Digital evidence and ‘cloud’ computing", | ||
+ | journal = "Computer Law & Security Review", | ||
+ | volume = {27}, | ||
+ | issue = {5}, | ||
+ | year = {September 2011}, | ||
+ | pages = {524--528} | ||
+ | </bibtex> | ||
− | == | + | <bibtex> |
− | + | @article{dykstraJournal, | |
+ | author = "Josiah Dykstra and Alan. T. Sherman", | ||
+ | title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies", | ||
+ | journal ={Journal of Network Forensics}, | ||
+ | volume = {3}, | ||
+ | number = {1}, | ||
+ | year = {Autumn, 2011}, | ||
+ | pages = {19--31} | ||
+ | } | ||
+ | </bibtex> | ||
− | { | + | <bibtex> |
− | + | @article{ruan, | |
− | + | title="Cloud forensics: An overview", | |
− | + | author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie}, | |
− | + | booktitle={Advances in Digital Forensics VII}, | |
− | + | year={2011}, | |
− | + | url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf" | |
− | + | } | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | </bibtex> | |
+ | <bibtex> | ||
− | + | @inproceedings{ruanSurvey, | |
− | { | + | title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis", |
− | + | author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi}, | |
− | + | booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law}, | |
− | + | year={2011}, | |
− | + | organization={ADFSL}, | |
− | + | url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf" | |
− | + | } | |
− | + | </bibtex> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | <bibtex> | |
− | { | + | @article{CloudForensics, |
− | + | author = {Mark Taylor and John Haggerty and David Gresty and David Lamb}, | |
− | + | title = {Forensic investigation of cloud computing systems}, | |
− | + | journal ={Network Security}, | |
− | + | volume = {2011}, | |
− | + | number = {3}, | |
− | + | year = {2011}, | |
− | + | pages = {4--10}, | |
− | + | url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf" | |
− | + | } | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | == | + | </bibtex> |
− | + | <bibtex> | |
− | == | + | |
− | + | @inproceedings{birk, | |
− | + | title="Technical Issues of Forensic Investigations in Cloud Computing Environments", | |
− | + | booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)}, | |
+ | author={Dominik Birk and Christoph Wegener}, | ||
+ | year={2011}, | ||
+ | organization={IEEE}, | ||
+ | address = {Oakland, CA, USA}, | ||
+ | url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf" | ||
+ | } | ||
+ | |||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{Araiza11, | ||
+ | title="Electronic Discovery in the Cloud", | ||
+ | author={Alberto G. Araiza}, | ||
+ | journal={Duke Law and Technology Review}, | ||
+ | volume = {8}, | ||
+ | year = {2011}, | ||
+ | url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr" | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{Cross10, | ||
+ | title="E-Discovery and Cloud Computing: Control of ESI in the Cloud", | ||
+ | author={David D. Cross and Emily Kuwahara}, | ||
+ | journal={EDDE Journal}, | ||
+ | volume = {1}, | ||
+ | number = {2}, | ||
+ | year = {2010}, | ||
+ | pages = {2--12}, | ||
+ | url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf" | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @book{Lil10, | ||
+ | title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data", | ||
+ | author={Terrance V. Lillard}, | ||
+ | year={2010}, | ||
+ | publisher={Syngress}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @inproceedings{Lu10, | ||
+ | title="Secure provenance: the essential of bread and butter of data forensics in cloud computing", | ||
+ | booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)}, | ||
+ | author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen}, | ||
+ | pages={282--292}, | ||
+ | year={2010}, | ||
+ | address={New York, NY, USA}, | ||
+ | organization={ACM}, | ||
+ | url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf" | ||
+ | } | ||
+ | |||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | |||
+ | @inproceedings{Wol09, | ||
+ | title="Overcast: Forensic Discovery in Cloud Environments", | ||
+ | booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)}, | ||
+ | author={Stephen D. Wolthusen}, | ||
+ | pages={3--9}, | ||
+ | year={2009}, | ||
+ | address={Washington, DC, USA}, | ||
+ | organization={IEEE Computer Society} | ||
+ | } | ||
+ | |||
+ | </bibtex> | ||
+ | |||
+ | |||
+ | |||
+ | [[Category:Bibliographies]] |
Revision as of 14:43, 27 June 2012
In chronological order, oldest to most recent
Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
- Digital Investigation 9:S90--S98,2012
- http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
BibtexAuthor : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012
Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
- Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
- BibtexAuthor : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011
Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
- Computer Law & Security Review 27:524--528,September 2011
- BibtexAuthor : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011
Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
- Journal of Network Forensics 3(1):19--31,Autumn, 2011
- BibtexAuthor : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011
Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
- ,2011
- http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
BibtexAuthor : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011
Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
- Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
- http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
BibtexAuthor : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011
Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
- Network Security 2011(3):4--10,2011
- http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
BibtexAuthor : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011
Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
- Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
- http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
BibtexAuthor : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011
Alberto G. Araiza - Electronic Discovery in the Cloud
- Duke Law and Technology Review 8,2011
- http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
BibtexAuthor : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011
David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
- EDDE Journal 1(2):2--12,2010
- http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
BibtexAuthor : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010
Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
- Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
- http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
BibtexAuthor : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010
Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
- Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
- BibtexAuthor : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009