Forensicswiki.org has moved to this site, forensicswiki.xyz. For information, please join the Google Group forensicswiki-reborn

Cloud Forensics Bibliography

From Forensics Wiki
Jump to navigation Jump to search

In chronological order, most recent to oldest


<bibtex> @inproceedings{OrtonLegalCloud, Author = {Ivan Orton and Aaron Alva and Barbara Endicott-Popovsky}, title = {Legal Process and Requirements for Cloud Forensic Investigations}, booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes}, Editor = {K. Ruan}, Pages = {186-229}, Publisher = {IGI Global}, Year = {2013},

       url = {http://ssrn.com/abstract=2197978}}

</bibtex>

<bibtex> @inproceedings{DykstraSeizing, Author = {Josiah Dykstra}, title = {Seizing Electronic Evidence from Cloud Computing Environments}, booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes}, Editor = {K. Ruan}, Publisher = {IGI Global}, Year = {2013}} </bibtex>

<bibtex> @inproceedings{dykstra-frost,

title="Digital Forensic Tools for the OpenStack Cloud Computing Platform",
year=2013,
author="Josiah Dykstra and Alan T. Sherman",
booktitle="DFRWS 2013",
url="http://www.dfrws.org/2013/proceedings/DFRWS2013-9.pdf",

location="Monterey, CA",

publisher="Elsevier"

} </bibtex>


<bibtex> @book{Ruan13,

 title="Cybercrime and Cloud Forensics: Applications for Investigation Processes",
 author={Keyun Ruan},
 year={2013},
 publisher={IGI Global},
 url = {http://www.igi-global.com/book/cybercrime-cloud-forensics/69206}

} </bibtex>

<bibtex> @article{DykstraJOLT,

author = "Josiah Dykstra and Damien Riehl",
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
journal = "Richmond Journal of Law and Technology",
volume = {19},
issue = {1},
year = {2012},
 url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"

</bibtex>

<bibtex> @article{Poisel2012,

 title="Discussion on the Challenges and Opportunities of Cloud Forensics",
 author="Rainer Poisel and Simon Tjoa",
 journal="Multidisciplinary Research and Practice for Information Systems",
 pages={593--608},
 year={2012},
 publisher={Springer}

</bibtex>

<bibtex> @article{Grispos12,

author = "George Grispos and Tim Storer and William Bradley Glisson",
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
journal = "International Journal of Digital Crime and Forensics",
volume = {4},,
issue = {2},
year = {2012},
 url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"

</bibtex>

<bibtex> @article{Dykstra12,

author = "Josiah Dykstra and Alan T. Sherman",
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
journal = "Digital Investigation",
volume = {9},
year = {2012},
pages = {S90--S98},
 url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"

</bibtex>

<bibtex> @inproceedings{AlvaSADFE, Author = {Aaron Alva and Scott David and Barbara Endicott-Popovsky}, title = {Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud}, booktitle = {Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)}, Year = {2012}

       address = {Vancouver, BC}}

</bibtex>

<bibtex> @inproceedings{ISSA,

author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
title = "Isolating a cloud instance for a digital forensic investigation",
 booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
 year={August 2011},
 organization={ISSA},

</bibtex>

<bibtex> @article{CLSR,

author = "Esther George and Stephen Mason",
title = "Digital evidence and ‘cloud’ computing",
journal = "Computer Law & Security Review",
volume = {27},
issue = {5},
year = {September 2011},
pages = {524--528}

</bibtex>

<bibtex> @article{dykstraJournal,

 author = "Josiah Dykstra and Alan. T. Sherman",
 title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
 journal ={Journal of Network Forensics},
 volume = {3},
 number = {1},
 year = {Autumn, 2011},
 pages = {19--31}

} </bibtex>

<bibtex> @article{ruan,

 title="Cloud forensics: An overview",
 author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
 booktitle={Advances in Digital Forensics VII},
 year={2011},
 url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"

}

</bibtex> <bibtex>

@inproceedings{ruanSurvey,

 title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
 author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
 booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
 year={2011},
 organization={ADFSL},
 url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"

} </bibtex>

<bibtex> @article{CloudForensics,

 author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
 title = {Forensic investigation of cloud computing systems},
 journal ={Network Security},
 volume = {2011},
 number = {3},
 year = {2011},
 pages = {4--10},
 url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"

}

</bibtex> <bibtex>

@inproceedings{birk,

 title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
 booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
 author={Dominik Birk and Christoph Wegener},
 year={2011},
 organization={IEEE},
 address = {Oakland, CA, USA},
 url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"

}

</bibtex>

<bibtex> @article{Araiza11,

 title="Electronic Discovery in the Cloud",
 author={Alberto G. Araiza},
 journal={Duke Law and Technology Review},
 volume = {8},
 year = {2011},
 url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"

} </bibtex>

<bibtex> @article{Cross10,

 title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
 author={David D. Cross and Emily Kuwahara},
 journal={EDDE Journal},
 volume = {1},
 number = {2},
 year = {2010},
 pages = {2--12},
 url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"

} </bibtex>

<bibtex> @book{Lil10,

 title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
 author={Terrance V. Lillard},
 year={2010},
 publisher={Syngress},

} </bibtex>

<bibtex> @inproceedings{Lu10,

 title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
 booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
 author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
 pages={282--292},
 year={2010},
 address={New York, NY, USA},
 organization={ACM},
 url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"

}

</bibtex>

<bibtex>

@inproceedings{Wol09,

 title="Overcast: Forensic Discovery in Cloud Environments",
 booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
 author={Stephen D. Wolthusen},
 pages={3--9},
 year={2009},
 address={Washington, DC, USA},
 organization={IEEE Computer Society}

}

</bibtex>