Difference between pages "Cloud Forensics Bibliography" and "File:Lg-p930-nitro-hd-connected-via-jtag-3.png"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
'''In chronological order, most recent to oldest'''
 
  
 
<bibtex>
 
@inproceedings{OrtonLegalCloud,
 
Author = {Ivan Orton and Aaron Alva and Barbara Endicott-Popovsky},
 
title = {Legal Process and Requirements for Cloud Forensic Investigations},
 
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 
Editor = {K. Ruan},
 
Pages = {186-229},
 
Publisher = {IGI Global},
 
Year = {2013},
 
        url = {http://ssrn.com/abstract=2197978}}
 
</bibtex>
 
 
<bibtex>
 
@inproceedings{DykstraSeizing,
 
Author = {Josiah Dykstra},
 
title = {Seizing Electronic Evidence from Cloud Computing Environments},
 
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
 
Editor = {K. Ruan},
 
Publisher = {IGI Global},
 
Year = {2013}}
 
</bibtex>
 
 
<bibtex>
 
@book{Ruan13,
 
  title="Cybercrime and Cloud Forensics: Applications for Investigation Processes",
 
  author={Keyun Ruan},
 
  year={2013},
 
  publisher={IGI Global},
 
  url = {http://www.igi-global.com/book/cybercrime-cloud-forensics/69206}
 
}
 
</bibtex>
 
 
<bibtex>
 
@article{DykstraJOLT,
 
author = "Josiah Dykstra and Damien Riehl",
 
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
 
journal = "Richmond Journal of Law and Technology",
 
volume = {19},
 
issue = {1},
 
year = {2012},
 
  url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"
 
</bibtex>
 
 
<bibtex>
 
@article{Poisel2012,
 
  title="Discussion on the Challenges and Opportunities of Cloud Forensics",
 
  author="Rainer Poisel and Simon Tjoa",
 
  journal="Multidisciplinary Research and Practice for Information Systems",
 
  pages={593--608},
 
  year={2012},
 
  publisher={Springer}
 
</bibtex>
 
 
<bibtex>
 
@article{Grispos12,
 
author = "George Grispos and Tim Storer and William Bradley Glisson",
 
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
 
journal = "International Journal of Digital Crime and Forensics",
 
volume = {4},,
 
issue = {2},
 
year = {2012},
 
  url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"
 
</bibtex>
 
 
<bibtex>
 
@article{Dykstra12,
 
author = "Josiah Dykstra and Alan T. Sherman",
 
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
 
journal = "Digital Investigation",
 
volume = {9},
 
year = {2012},
 
pages = {S90--S98},
 
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 
</bibtex>
 
 
<bibtex>
 
@inproceedings{AlvaSADFE,
 
Author = {Aaron Alva and Scott David and Barbara Endicott-Popovsky},
 
title = {Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud},
 
booktitle = {Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 
Year = {2012}
 
        address = {Vancouver, BC}}
 
</bibtex>
 
 
<bibtex>
 
@inproceedings{ISSA,
 
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
 
title = "Isolating a cloud instance for a digital forensic investigation",
 
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
 
  year={August 2011},
 
  organization={ISSA},
 
</bibtex>
 
 
<bibtex>
 
@article{CLSR,
 
author = "Esther George and Stephen Mason",
 
title = "Digital evidence and ‘cloud’ computing",
 
journal = "Computer Law & Security Review",
 
volume = {27},
 
issue = {5},
 
year = {September 2011},
 
pages = {524--528}
 
</bibtex>
 
 
<bibtex>
 
@article{dykstraJournal,
 
  author = "Josiah Dykstra and Alan. T. Sherman",
 
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
 
  journal ={Journal of Network Forensics},
 
  volume = {3},
 
  number = {1},
 
  year = {Autumn, 2011},
 
  pages = {19--31}
 
}
 
</bibtex>
 
 
<bibtex>
 
@article{ruan,
 
  title="Cloud forensics: An overview",
 
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
 
  booktitle={Advances in Digital Forensics VII},
 
  year={2011},
 
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
 
}
 
 
</bibtex>
 
<bibtex>
 
 
@inproceedings{ruanSurvey,
 
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
 
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
 
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
 
  year={2011},
 
  organization={ADFSL},
 
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
 
}
 
</bibtex>
 
 
<bibtex>
 
@article{CloudForensics,
 
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
 
  title = {Forensic investigation of cloud computing systems},
 
  journal ={Network Security},
 
  volume = {2011},
 
  number = {3},
 
  year = {2011},
 
  pages = {4--10},
 
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
 
}
 
 
</bibtex>
 
<bibtex>
 
 
@inproceedings{birk,
 
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
 
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 
  author={Dominik Birk and Christoph Wegener},
 
  year={2011},
 
  organization={IEEE},
 
  address = {Oakland, CA, USA},
 
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
 
}
 
 
</bibtex>
 
 
<bibtex>
 
@article{Araiza11,
 
  title="Electronic Discovery in the Cloud",
 
  author={Alberto G. Araiza},
 
  journal={Duke Law and Technology Review},
 
  volume = {8},
 
  year = {2011},
 
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
 
}
 
</bibtex>
 
 
<bibtex>
 
@article{Cross10,
 
  title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
 
  author={David D. Cross and Emily Kuwahara},
 
  journal={EDDE Journal},
 
  volume = {1},
 
  number = {2},
 
  year = {2010},
 
  pages = {2--12},
 
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
 
}
 
</bibtex>
 
 
<bibtex>
 
@book{Lil10,
 
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
 
  author={Terrance V. Lillard},
 
  year={2010},
 
  publisher={Syngress},
 
}
 
</bibtex>
 
 
<bibtex>
 
@inproceedings{Lu10,
 
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
 
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
 
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
 
  pages={282--292},
 
  year={2010},
 
  address={New York, NY, USA},
 
  organization={ACM},
 
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
 
}
 
 
</bibtex>
 
 
<bibtex>
 
 
@inproceedings{Wol09,
 
  title="Overcast: Forensic Discovery in Cloud Environments",
 
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
 
  author={Stephen D. Wolthusen},
 
  pages={3--9},
 
  year={2009},
 
  address={Washington, DC, USA},
 
  organization={IEEE Computer Society}
 
}
 
 
</bibtex>
 
 
 
 
[[Category:Bibliographies]]
 

Latest revision as of 23:13, 17 August 2013