Difference between pages "Cloud Forensics Bibliography" and "User:Johny Ryder"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Poisel publication added)
 
m
 
Line 1: Line 1:
'''In chronological order, oldest to most recent'''
+
Data expert, tech lover, privacy protector. I started using computers and the internet early 1994. And I can not imagine how I would ever be able to communicate with my friends and family without these products.
  
<bibtex>
+
It is great to be able to share through the internet. But (semi) public sharing has its downsides too. I like to read about and work on keeping the protection of private information something individuals can control themselves.
@article{DykstraJOLT,
+
author = "Josiah Dykstra and Damien Riehl",
+
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
+
journal = "Richmond Journal of Law and Technology",
+
volume = {19},
+
issue = {1},
+
year = {2012},
+
  url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"
+
</bibtex>
+
  
<bibtex>
+
But sometimes it is good that there are forensic tools available. Just as long these tools are used properly. I hope people are aware of the possibilities to protect their privacy, and protectors of the public domain are aware of the forensic tools available, and use them properly.
@article{Poisel2012,
+
  title="Discussion on the Challenges and Opportunities of Cloud Forensics",
+
  author="Rainer Poisel and Simon Tjoa",
+
  journal="Multidisciplinary Research and Practice for Information Systems",
+
  pages={593--608},
+
  year={2012},
+
  publisher={Springer}
+
</bibtex>
+
  
<bibtex>
+
I hereby license all my contributions to this wiki under the Creative Commons Attribution-ShareAlike 2.5 license.
@article{Grispos12,
+
author = "George Grispos and Tim Storer and William Bradley Glisson",
+
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
+
journal = "International Journal of Digital Crime and Forensics",
+
volume = {4},,
+
issue = {2},
+
year = {2012},
+
  url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"
+
</bibtex>
+
 
+
<bibtex>
+
@article{Dykstra12,
+
author = "Josiah Dykstra and Alan T. Sherman",
+
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
+
journal = "Digital Investigation",
+
volume = {9},
+
year = {2012},
+
pages = {S90--S98},
+
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
+
</bibtex>
+
 
+
<bibtex>
+
@inproceedings{ISSA,
+
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
+
title = "Isolating a cloud instance for a digital forensic investigation",
+
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
+
  year={August 2011},
+
  organization={ISSA},
+
</bibtex>
+
 
+
<bibtex>
+
@article{CLSR,
+
author = "Esther George and Stephen Mason",
+
title = "Digital evidence and ‘cloud’ computing",
+
journal = "Computer Law & Security Review",
+
volume = {27},
+
issue = {5},
+
year = {September 2011},
+
pages = {524--528}
+
</bibtex>
+
 
+
<bibtex>
+
@article{dykstraJournal,
+
  author = "Josiah Dykstra and Alan. T. Sherman",
+
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
+
  journal ={Journal of Network Forensics},
+
  volume = {3},
+
  number = {1},
+
  year = {Autumn, 2011},
+
  pages = {19--31}
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{ruan,
+
  title="Cloud forensics: An overview",
+
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
+
  booktitle={Advances in Digital Forensics VII},
+
  year={2011},
+
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
+
}
+
 
+
</bibtex>
+
<bibtex>
+
 
+
@inproceedings{ruanSurvey,
+
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
+
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
+
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
+
  year={2011},
+
  organization={ADFSL},
+
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{CloudForensics,
+
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
+
  title = {Forensic investigation of cloud computing systems},
+
  journal ={Network Security},
+
  volume = {2011},
+
  number = {3},
+
  year = {2011},
+
  pages = {4--10},
+
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
+
}
+
 
+
</bibtex>
+
<bibtex>
+
 
+
@inproceedings{birk,
+
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
+
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
+
  author={Dominik Birk and Christoph Wegener},
+
  year={2011},
+
  organization={IEEE},
+
  address = {Oakland, CA, USA},
+
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
+
}
+
 
+
</bibtex>
+
 
+
<bibtex>
+
@article{Araiza11,
+
  title="Electronic Discovery in the Cloud",
+
  author={Alberto G. Araiza},
+
  journal={Duke Law and Technology Review},
+
  volume = {8},
+
  year = {2011},
+
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{Cross10,
+
  title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
+
  author={David D. Cross and Emily Kuwahara},
+
  journal={EDDE Journal},
+
  volume = {1},
+
  number = {2},
+
  year = {2010},
+
  pages = {2--12},
+
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@book{Lil10,
+
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
+
  author={Terrance V. Lillard},
+
  year={2010},
+
  publisher={Syngress},
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@inproceedings{Lu10,
+
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
+
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
+
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
+
  pages={282--292},
+
  year={2010},
+
  address={New York, NY, USA},
+
  organization={ACM},
+
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
+
}
+
 
+
</bibtex>
+
 
+
<bibtex>
+
 
+
@inproceedings{Wol09,
+
  title="Overcast: Forensic Discovery in Cloud Environments",
+
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
+
  author={Stephen D. Wolthusen},
+
  pages={3--9},
+
  year={2009},
+
  address={Washington, DC, USA},
+
  organization={IEEE Computer Society}
+
}
+
 
+
</bibtex>
+
 
+
 
+
 
+
[[Category:Bibliographies]]
+

Revision as of 04:04, 23 December 2011

Data expert, tech lover, privacy protector. I started using computers and the internet early 1994. And I can not imagine how I would ever be able to communicate with my friends and family without these products.

It is great to be able to share through the internet. But (semi) public sharing has its downsides too. I like to read about and work on keeping the protection of private information something individuals can control themselves.

But sometimes it is good that there are forensic tools available. Just as long these tools are used properly. I hope people are aware of the possibilities to protect their privacy, and protectors of the public domain are aware of the forensic tools available, and use them properly.

I hereby license all my contributions to this wiki under the Creative Commons Attribution-ShareAlike 2.5 license.