Difference between revisions of "Cloud Forensics Bibliography"

From ForensicsWiki
Jump to: navigation, search
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
'''In chronological order, oldest to most recent'''
+
'''In chronological order, most recent to oldest'''
 +
 
 +
 
 +
<bibtex>
 +
@inproceedings{OrtonLegalCloud,
 +
Author = {Ivan Orton and Aaron Alva and Barbara Endicott-Popovsky},
 +
title = {Legal Process and Requirements for Cloud Forensic Investigations},
 +
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 +
Editor = {K. Ruan},
 +
Pages = {186-229},
 +
Publisher = {IGI Global},
 +
Year = {2013},
 +
        url = {http://ssrn.com/abstract=2197978}}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{DykstraSeizing,
 +
Author = {Josiah Dykstra},
 +
title = {Seizing Electronic Evidence from Cloud Computing Environments},
 +
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 +
Editor = {K. Ruan},
 +
Publisher = {IGI Global},
 +
Year = {2013}}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@book{Ruan13,
 +
  title="Cybercrime and Cloud Forensics: Applications for Investigation Processes",
 +
  author={Keyun Ruan},
 +
  year={2013},
 +
  publisher={IGI Global},
 +
  url = {http://www.igi-global.com/book/cybercrime-cloud-forensics/69206}
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{DykstraJOLT,
 +
author = "Josiah Dykstra and Damien Riehl",
 +
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
 +
journal = "Richmond Journal of Law and Technology",
 +
volume = {19},
 +
issue = {1},
 +
year = {2012},
 +
  url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Poisel2012,
 +
  title="Discussion on the Challenges and Opportunities of Cloud Forensics",
 +
  author="Rainer Poisel and Simon Tjoa",
 +
  journal="Multidisciplinary Research and Practice for Information Systems",
 +
  pages={593--608},
 +
  year={2012},
 +
  publisher={Springer}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Grispos12,
 +
author = "George Grispos and Tim Storer and William Bradley Glisson",
 +
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
 +
journal = "International Journal of Digital Crime and Forensics",
 +
volume = {4},,
 +
issue = {2},
 +
year = {2012},
 +
  url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"
 +
</bibtex>
  
 
<bibtex>
 
<bibtex>
Line 10: Line 75:
 
  pages = {S90--S98},
 
  pages = {S90--S98},
 
   url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 
   url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 +
</bibtex>
 +
 +
<bibtex>
 +
@inproceedings{AlvaSADFE,
 +
Author = {Aaron Alva and Scott David and Barbara Endicott-Popovsky},
 +
title = {Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud},
 +
booktitle = {Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 +
Year = {2012}
 +
        address = {Vancouver, BC}}
 
</bibtex>
 
</bibtex>
  

Revision as of 06:57, 5 August 2013

In chronological order, most recent to oldest


Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky - Legal Process and Requirements for Cloud Forensic Investigations
Cybercrime and Cloud Forensics: Applications for Investigation Processes pp. 186-229,2013
http://ssrn.com/abstract=2197978
Bibtex
Author : Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky
Title : Legal Process and Requirements for Cloud Forensic Investigations
In : Cybercrime and Cloud Forensics: Applications for Investigation Processes -
Address :
Date : 2013

Josiah Dykstra - Seizing Electronic Evidence from Cloud Computing Environments
Cybercrime and Cloud Forensics: Applications for Investigation Processes ,2013
Bibtex
Author : Josiah Dykstra
Title : Seizing Electronic Evidence from Cloud Computing Environments
In : Cybercrime and Cloud Forensics: Applications for Investigation Processes -
Address :
Date : 2013

Keyun Ruan - Cybercrime and Cloud Forensics: Applications for Investigation Processes
IGI Global,2013
http://www.igi-global.com/book/cybercrime-cloud-forensics/69206
Bibtex
Author : Keyun Ruan
Title : Cybercrime and Cloud Forensics: Applications for Investigation Processes
In : -
Address :
Date : 2013

Josiah Dykstra, Damien Riehl - Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
Richmond Journal of Law and Technology 19,2012
http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf
Bibtex
Author : Josiah Dykstra, Damien Riehl
Title : Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
In : Richmond Journal of Law and Technology -
Address :
Date : 2012

Rainer Poisel, Simon Tjoa - Discussion on the Challenges and Opportunities of Cloud Forensics
Multidisciplinary Research and Practice for Information Systems pp. 593--608,2012
Bibtex
Author : Rainer Poisel, Simon Tjoa
Title : Discussion on the Challenges and Opportunities of Cloud Forensics
In : Multidisciplinary Research and Practice for Information Systems -
Address :
Date : 2012

George Grispos, Tim Storer, William Bradley Glisson - Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
International Journal of Digital Crime and Forensics 4,2012
http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf
Bibtex
Author : George Grispos, Tim Storer, William Bradley Glisson
Title : Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
In : International Journal of Digital Crime and Forensics -
Address :
Date : 2012

Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Digital Investigation 9:S90--S98,2012
http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
Bibtex
Author : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012

Aaron Alva, Scott David, Barbara Endicott-Popovsky - Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud
Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Vancouver, BC,2012
Bibtex
Author : Aaron Alva, Scott David, Barbara Endicott-Popovsky
Title : Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud
In : Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Vancouver, BC
Date : 2012

Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
Bibtex
Author : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011

Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
Computer Law & Security Review 27:524--528,September 2011
Bibtex
Author : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011

Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Journal of Network Forensics 3(1):19--31,Autumn, 2011
Bibtex
Author : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
,2011
http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
Bibtex
Author : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011

Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
Bibtex
Author : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011

Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
Network Security 2011(3):4--10,2011
http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
Bibtex
Author : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011

Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
Bibtex
Author : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011

Alberto G. Araiza - Electronic Discovery in the Cloud
Duke Law and Technology Review 8,2011
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
Bibtex
Author : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011

David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
EDDE Journal 1(2):2--12,2010
http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
Bibtex
Author : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010

Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Syngress,2010
Bibtex
Author : Terrance V. Lillard
Title : Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
In : -
Address :
Date : 2010

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
Bibtex
Author : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010

Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
Bibtex
Author : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009