Difference between pages "Oxygen Software" and "Cloud Forensics Bibliography"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (About)
 
 
Line 1: Line 1:
===About===
+
'''In chronological order, most recent to oldest'''
Founded in 2000, Oxygen Software is the worldwide leading maker of the advanced forensic data examination tools for smartphones and other mobile devices. The company is dedicated to delivering the most universal forensic solution covering the widest range of mobile devices running Android, iOS, Blackberry, Windows Phone, Symbian and other operating systems. Law enforcement and government agencies, institutions, corporations and private investigators, help desk personnel and thousands of private consumers rely on Oxygen Software products to ensure evidence availability in the event of mobile device data analysis and recovery. Oxygen Software customers include various US and European federal and state agencies such as the IRS, US Army, US Department of Defense (DOD), US Department of Justice, US Department of Homeland Security, US Department of Transportation, US Postal Service, US Supreme Court, European Commission, London Metropolitan Police, French National Police and Gendarmerie, PricewaterhouseCoopers, Ernst & Young, and many others. As a result, [[Oxygen Forensic Suite 2013|Oxygen Forensic Suite]] receives great response at forensic conferences, exhibitions and trainings, and occupies a spot on the top of the list in relevant tests for extracting more data than competitors.
+
  
===Links===
+
 
* [http://www.oxygensoftware.com Official Site]
+
<bibtex>
* [http://www.oxygen-forensic.com Oxygen Forensic Suite Site]
+
@inproceedings{OrtonLegalCloud,
 +
Author = {Ivan Orton and Aaron Alva and Barbara Endicott-Popovsky},
 +
title = {Legal Process and Requirements for Cloud Forensic Investigations},
 +
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 +
Editor = {K. Ruan},
 +
Pages = {186-229},
 +
Publisher = {IGI Global},
 +
Year = {2013},
 +
        url = {http://ssrn.com/abstract=2197978}}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{DykstraSeizing,
 +
Author = {Josiah Dykstra},
 +
title = {Seizing Electronic Evidence from Cloud Computing Environments},
 +
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 +
Editor = {K. Ruan},
 +
Publisher = {IGI Global},
 +
Year = {2013}}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@book{Ruan13,
 +
  title="Cybercrime and Cloud Forensics: Applications for Investigation Processes",
 +
  author={Keyun Ruan},
 +
  year={2013},
 +
  publisher={IGI Global},
 +
  url = {http://www.igi-global.com/book/cybercrime-cloud-forensics/69206}
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{DykstraJOLT,
 +
author = "Josiah Dykstra and Damien Riehl",
 +
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
 +
journal = "Richmond Journal of Law and Technology",
 +
volume = {19},
 +
issue = {1},
 +
year = {2012},
 +
  url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Poisel2012,
 +
  title="Discussion on the Challenges and Opportunities of Cloud Forensics",
 +
  author="Rainer Poisel and Simon Tjoa",
 +
  journal="Multidisciplinary Research and Practice for Information Systems",
 +
  pages={593--608},
 +
  year={2012},
 +
  publisher={Springer}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Grispos12,
 +
author = "George Grispos and Tim Storer and William Bradley Glisson",
 +
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
 +
journal = "International Journal of Digital Crime and Forensics",
 +
volume = {4},,
 +
issue = {2},
 +
year = {2012},
 +
  url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Dykstra12,
 +
author = "Josiah Dykstra and Alan T. Sherman",
 +
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
 +
journal = "Digital Investigation",
 +
volume = {9},
 +
year = {2012},
 +
pages = {S90--S98},
 +
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{AlvaSADFE,
 +
Author = {Aaron Alva and Scott David and Barbara Endicott-Popovsky},
 +
title = {Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud},
 +
booktitle = {Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 +
Year = {2012}
 +
        address = {Vancouver, BC}}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{ISSA,
 +
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
 +
title = "Isolating a cloud instance for a digital forensic investigation",
 +
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
 +
  year={August 2011},
 +
  organization={ISSA},
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{CLSR,
 +
author = "Esther George and Stephen Mason",
 +
title = "Digital evidence and ‘cloud’ computing",
 +
journal = "Computer Law & Security Review",
 +
volume = {27},
 +
issue = {5},
 +
year = {September 2011},
 +
pages = {524--528}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{dykstraJournal,
 +
  author = "Josiah Dykstra and Alan. T. Sherman",
 +
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
 +
  journal ={Journal of Network Forensics},
 +
  volume = {3},
 +
  number = {1},
 +
  year = {Autumn, 2011},
 +
  pages = {19--31}
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{ruan,
 +
  title="Cloud forensics: An overview",
 +
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
 +
  booktitle={Advances in Digital Forensics VII},
 +
  year={2011},
 +
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
 +
}
 +
 
 +
</bibtex>
 +
<bibtex>
 +
 
 +
@inproceedings{ruanSurvey,
 +
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
 +
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
 +
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
 +
  year={2011},
 +
  organization={ADFSL},
 +
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{CloudForensics,
 +
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
 +
  title = {Forensic investigation of cloud computing systems},
 +
  journal ={Network Security},
 +
  volume = {2011},
 +
  number = {3},
 +
  year = {2011},
 +
  pages = {4--10},
 +
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
 +
}
 +
 
 +
</bibtex>
 +
<bibtex>
 +
 
 +
@inproceedings{birk,
 +
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
 +
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 +
  author={Dominik Birk and Christoph Wegener},
 +
  year={2011},
 +
  organization={IEEE},
 +
  address = {Oakland, CA, USA},
 +
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
 +
}
 +
 
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Araiza11,
 +
  title="Electronic Discovery in the Cloud",
 +
  author={Alberto G. Araiza},
 +
  journal={Duke Law and Technology Review},
 +
  volume = {8},
 +
  year = {2011},
 +
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@article{Cross10,
 +
  title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
 +
  author={David D. Cross and Emily Kuwahara},
 +
  journal={EDDE Journal},
 +
  volume = {1},
 +
  number = {2},
 +
  year = {2010},
 +
  pages = {2--12},
 +
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@book{Lil10,
 +
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
 +
  author={Terrance V. Lillard},
 +
  year={2010},
 +
  publisher={Syngress},
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@inproceedings{Lu10,
 +
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
 +
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
 +
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
 +
  pages={282--292},
 +
  year={2010},
 +
  address={New York, NY, USA},
 +
  organization={ACM},
 +
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
 +
}
 +
 
 +
</bibtex>
 +
 
 +
<bibtex>
 +
 
 +
@inproceedings{Wol09,
 +
  title="Overcast: Forensic Discovery in Cloud Environments",
 +
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
 +
  author={Stephen D. Wolthusen},
 +
  pages={3--9},
 +
  year={2009},
 +
  address={Washington, DC, USA},
 +
  organization={IEEE Computer Society}
 +
}
 +
 
 +
</bibtex>
 +
 
 +
 
 +
 
 +
[[Category:Bibliographies]]

Revision as of 07:57, 5 August 2013

In chronological order, most recent to oldest


Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky - Legal Process and Requirements for Cloud Forensic Investigations
Cybercrime and Cloud Forensics: Applications for Investigation Processes pp. 186-229,2013
http://ssrn.com/abstract=2197978
Bibtex
Author : Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky
Title : Legal Process and Requirements for Cloud Forensic Investigations
In : Cybercrime and Cloud Forensics: Applications for Investigation Processes -
Address :
Date : 2013

Josiah Dykstra - Seizing Electronic Evidence from Cloud Computing Environments
Cybercrime and Cloud Forensics: Applications for Investigation Processes ,2013
Bibtex
Author : Josiah Dykstra
Title : Seizing Electronic Evidence from Cloud Computing Environments
In : Cybercrime and Cloud Forensics: Applications for Investigation Processes -
Address :
Date : 2013

Keyun Ruan - Cybercrime and Cloud Forensics: Applications for Investigation Processes
IGI Global,2013
http://www.igi-global.com/book/cybercrime-cloud-forensics/69206
Bibtex
Author : Keyun Ruan
Title : Cybercrime and Cloud Forensics: Applications for Investigation Processes
In : -
Address :
Date : 2013

Josiah Dykstra, Damien Riehl - Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
Richmond Journal of Law and Technology 19,2012
http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf
Bibtex
Author : Josiah Dykstra, Damien Riehl
Title : Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
In : Richmond Journal of Law and Technology -
Address :
Date : 2012

Rainer Poisel, Simon Tjoa - Discussion on the Challenges and Opportunities of Cloud Forensics
Multidisciplinary Research and Practice for Information Systems pp. 593--608,2012
Bibtex
Author : Rainer Poisel, Simon Tjoa
Title : Discussion on the Challenges and Opportunities of Cloud Forensics
In : Multidisciplinary Research and Practice for Information Systems -
Address :
Date : 2012

George Grispos, Tim Storer, William Bradley Glisson - Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
International Journal of Digital Crime and Forensics 4,2012
http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf
Bibtex
Author : George Grispos, Tim Storer, William Bradley Glisson
Title : Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
In : International Journal of Digital Crime and Forensics -
Address :
Date : 2012

Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Digital Investigation 9:S90--S98,2012
http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
Bibtex
Author : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012

Aaron Alva, Scott David, Barbara Endicott-Popovsky - Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud
Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Vancouver, BC,2012
Bibtex
Author : Aaron Alva, Scott David, Barbara Endicott-Popovsky
Title : Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud
In : Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Vancouver, BC
Date : 2012

Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
Bibtex
Author : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011

Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
Computer Law & Security Review 27:524--528,September 2011
Bibtex
Author : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011

Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Journal of Network Forensics 3(1):19--31,Autumn, 2011
Bibtex
Author : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
,2011
http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
Bibtex
Author : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011

Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
Bibtex
Author : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011

Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
Network Security 2011(3):4--10,2011
http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
Bibtex
Author : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011

Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
Bibtex
Author : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011

Alberto G. Araiza - Electronic Discovery in the Cloud
Duke Law and Technology Review 8,2011
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
Bibtex
Author : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011

David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
EDDE Journal 1(2):2--12,2010
http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
Bibtex
Author : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010

Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Syngress,2010
Bibtex
Author : Terrance V. Lillard
Title : Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
In : -
Address :
Date : 2010

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
Bibtex
Author : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010

Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
Bibtex
Author : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009