Difference between revisions of "Cloud Forensics Bibliography"
From ForensicsWiki
(Initial page) |
(Poisel publication added) |
||
(6 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
'''In chronological order, oldest to most recent''' | '''In chronological order, oldest to most recent''' | ||
+ | |||
+ | <bibtex> | ||
+ | @article{DykstraJOLT, | ||
+ | author = "Josiah Dykstra and Damien Riehl", | ||
+ | title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing", | ||
+ | journal = "Richmond Journal of Law and Technology", | ||
+ | volume = {19}, | ||
+ | issue = {1}, | ||
+ | year = {2012}, | ||
+ | url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf" | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{Poisel2012, | ||
+ | title="Discussion on the Challenges and Opportunities of Cloud Forensics", | ||
+ | author="Rainer Poisel and Simon Tjoa", | ||
+ | journal="Multidisciplinary Research and Practice for Information Systems", | ||
+ | pages={593--608}, | ||
+ | year={2012}, | ||
+ | publisher={Springer} | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{Grispos12, | ||
+ | author = "George Grispos and Tim Storer and William Bradley Glisson", | ||
+ | title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics", | ||
+ | journal = "International Journal of Digital Crime and Forensics", | ||
+ | volume = {4},, | ||
+ | issue = {2}, | ||
+ | year = {2012}, | ||
+ | url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf" | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{Dykstra12, | ||
+ | author = "Josiah Dykstra and Alan T. Sherman", | ||
+ | title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques", | ||
+ | journal = "Digital Investigation", | ||
+ | volume = {9}, | ||
+ | year = {2012}, | ||
+ | pages = {S90--S98}, | ||
+ | url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf" | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @inproceedings{ISSA, | ||
+ | author = "Waldo Delport and Michael Kohn and Martin S. Olivier", | ||
+ | title = "Isolating a cloud instance for a digital forensic investigation", | ||
+ | booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference}, | ||
+ | year={August 2011}, | ||
+ | organization={ISSA}, | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @article{CLSR, | ||
+ | author = "Esther George and Stephen Mason", | ||
+ | title = "Digital evidence and ‘cloud’ computing", | ||
+ | journal = "Computer Law & Security Review", | ||
+ | volume = {27}, | ||
+ | issue = {5}, | ||
+ | year = {September 2011}, | ||
+ | pages = {524--528} | ||
+ | </bibtex> | ||
<bibtex> | <bibtex> | ||
Line 11: | Line 74: | ||
pages = {19--31} | pages = {19--31} | ||
} | } | ||
− | |||
</bibtex> | </bibtex> | ||
− | |||
+ | <bibtex> | ||
@article{ruan, | @article{ruan, | ||
title="Cloud forensics: An overview", | title="Cloud forensics: An overview", | ||
Line 34: | Line 96: | ||
url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf" | url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf" | ||
} | } | ||
+ | </bibtex> | ||
− | |||
<bibtex> | <bibtex> | ||
− | |||
@article{CloudForensics, | @article{CloudForensics, | ||
author = {Mark Taylor and John Haggerty and David Gresty and David Lamb}, | author = {Mark Taylor and John Haggerty and David Gresty and David Lamb}, | ||
Line 54: | Line 115: | ||
@inproceedings{birk, | @inproceedings{birk, | ||
title="Technical Issues of Forensic Investigations in Cloud Computing Environments", | title="Technical Issues of Forensic Investigations in Cloud Computing Environments", | ||
− | booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering}, | + | booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)}, |
author={Dominik Birk and Christoph Wegener}, | author={Dominik Birk and Christoph Wegener}, | ||
year={2011}, | year={2011}, | ||
Line 63: | Line 124: | ||
</bibtex> | </bibtex> | ||
+ | |||
<bibtex> | <bibtex> | ||
+ | @article{Araiza11, | ||
+ | title="Electronic Discovery in the Cloud", | ||
+ | author={Alberto G. Araiza}, | ||
+ | journal={Duke Law and Technology Review}, | ||
+ | volume = {8}, | ||
+ | year = {2011}, | ||
+ | url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr" | ||
+ | } | ||
+ | </bibtex> | ||
+ | <bibtex> | ||
+ | @article{Cross10, | ||
+ | title="E-Discovery and Cloud Computing: Control of ESI in the Cloud", | ||
+ | author={David D. Cross and Emily Kuwahara}, | ||
+ | journal={EDDE Journal}, | ||
+ | volume = {1}, | ||
+ | number = {2}, | ||
+ | year = {2010}, | ||
+ | pages = {2--12}, | ||
+ | url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf" | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
@book{Lil10, | @book{Lil10, | ||
title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data", | title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data", | ||
Line 71: | Line 156: | ||
publisher={Syngress}, | publisher={Syngress}, | ||
} | } | ||
− | |||
</bibtex> | </bibtex> | ||
<bibtex> | <bibtex> | ||
− | |||
− | |||
@inproceedings{Lu10, | @inproceedings{Lu10, | ||
title="Secure provenance: the essential of bread and butter of data forensics in cloud computing", | title="Secure provenance: the essential of bread and butter of data forensics in cloud computing", |
Revision as of 15:28, 19 December 2012
In chronological order, oldest to most recent
Josiah Dykstra, Damien Riehl - Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
- Richmond Journal of Law and Technology 19,2012
- http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf
BibtexAuthor : Josiah Dykstra, Damien Riehl
Title : Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
In : Richmond Journal of Law and Technology -
Address :
Date : 2012
Rainer Poisel, Simon Tjoa - Discussion on the Challenges and Opportunities of Cloud Forensics
- Multidisciplinary Research and Practice for Information Systems pp. 593--608,2012
- BibtexAuthor : Rainer Poisel, Simon Tjoa
Title : Discussion on the Challenges and Opportunities of Cloud Forensics
In : Multidisciplinary Research and Practice for Information Systems -
Address :
Date : 2012
George Grispos, Tim Storer, William Bradley Glisson - Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
- International Journal of Digital Crime and Forensics 4,2012
- http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf
BibtexAuthor : George Grispos, Tim Storer, William Bradley Glisson
Title : Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
In : International Journal of Digital Crime and Forensics -
Address :
Date : 2012
Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
- Digital Investigation 9:S90--S98,2012
- http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
BibtexAuthor : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012
Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
- Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
- BibtexAuthor : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011
Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
- Computer Law & Security Review 27:524--528,September 2011
- BibtexAuthor : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011
Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
- Journal of Network Forensics 3(1):19--31,Autumn, 2011
- BibtexAuthor : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011
Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
- ,2011
- http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
BibtexAuthor : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011
Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
- Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
- http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
BibtexAuthor : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011
Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
- Network Security 2011(3):4--10,2011
- http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
BibtexAuthor : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011
Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
- Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
- http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
BibtexAuthor : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011
Alberto G. Araiza - Electronic Discovery in the Cloud
- Duke Law and Technology Review 8,2011
- http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
BibtexAuthor : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011
David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
- EDDE Journal 1(2):2--12,2010
- http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
BibtexAuthor : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010
Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
- Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
- http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
BibtexAuthor : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010
Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
- Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
- BibtexAuthor : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009