Forward Integrity for Secure Audit Logs, 1997. ,
One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pp.274-285, 1994. ,
DOI : 10.1007/3-540-48285-7_24
Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011. ,
DOI : 10.1109/SADFE.2011.17
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2080
Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol.1, issue.2, 2002. ,
Isolating a cloud instance for a digital forensic investigation, Proceedings of the Information Security for South Africa Conference, 2011. ,
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, pp.87-95, 2013. ,
DOI : 10.1016/j.diin.2013.06.010
Gartner says that consumers will store more than a third of their digital content in the cloud by 2016, 2012. ,
Amazon cloud hosts nasty banking Trojan, The Register, 2011. ,
Preventing history forgery with secure provenance, ACM Transactions on Storage, vol.5, issue.4, 2009. ,
DOI : 10.1145/1629080.1629082
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7355
The case of the fake Picasso: Preventing history forgery with secure provenance, Proceedings of the Seventh USENIX Conference on File and Storage Technologies, pp.1-14, 2009. ,
Forensics examination of volatile system data using virtual introspection, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.74-82, 2008. ,
DOI : 10.1145/1368506.1368517
Secure provenance, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.282-292, 2010. ,
DOI : 10.1145/1755688.1755723
Collecting provenance via the Xen hypervisor, Proceedings of the Third Workshop on the Theory and Practice of Provenance, 2011. ,
Making a cloud provenance-aware, Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009. ,
Managing a Legal Hold on Cloud Documents, U.S. Patent Application, 2014. ,
Detecting temporal inconsistency in virtual machine activity timelines, Journal of Information Assurance and Security, vol.7, issue.1, pp.24-31, 2012. ,
SecLaaS, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.219-230, 2013. ,
DOI : 10.1145/2484313.2484342
Towards building proofs of past data possession in cloud forensics, ASE Science Journal, vol.1, issue.4, pp.195-207, 2012. ,