org -open-source ediscovery engine, 2011. ,
http://hadoop.apache.org/mapreduce 5. Security guidance for critical areas of focus in cloud computing v3, p.0, 2011. ,
Decryption and password cracking software ,
Business Process as a Service: Chances for Remote Auditing, 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops, 2011. ,
DOI : 10.1109/COMPSACW.2011.73
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.7971
Cryptography Goes to the Cloud, Proceedings of 1st International Workshop on Security and Trust for Applications in Virtualised Environments, pp.190-197, 2011. ,
DOI : 10.1007/978-3-540-70936-7_29
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module, Proceedings of Information Security and Cryptology, pp.131-143, 2007. ,
DOI : 10.1007/978-3-540-76788-6_11
Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport, Proceedings of the IEEE, vol.99, issue.1, pp.149-167, 2011. ,
DOI : 10.1109/JPROC.2010.2060451
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. Syngress Media, 2010. ,
Digital Forensic Research: The Good, the Bad and the Unaddressed, Advances in Digital Forensics V, IFIP Advances in Information and Communication Technology, pp.17-36 ,
DOI : 10.1016/j.diin.2004.07.006
Cloud Computing: The impact on digital forensic investigations, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), pp.1-6, 2009. ,
DOI : 10.1109/ICITST.2009.5402561
Technical challenges of forensic investigations in cloud computing environments, Proceedings of the Workshop on Cryptography and Security in Clouds, pp.1-6, 2011. ,
Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011. ,
DOI : 10.1109/SADFE.2011.17
Guidelines for evidence collection and archiving, RFCBest Current Practice), vol.3227, p.3227, 2002. ,
DOI : 10.17487/rfc3227
A Survey of Cloud Computing Challenges from a Digital Forensics Perspective, International Journal of Interdisciplinary Telecommunications and Networking, vol.3, issue.4, pp.1-16, 2011. ,
DOI : 10.4018/jitn.2011100101
Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, pp.1-20, 2003. ,
COMPUTER CRIME AND DIGITAL EVIDENCE, pp.6-10, 2011. ,
DOI : 10.1016/B0-12-369399-3/00062-8
Controlling data in the cloud:outsourcing computation without outsourcing control, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp.85-90, 2009. ,
Digital Forensic Evidence Examination -2nd Ed, 2010. ,
Distributed forensics and incident response in the enterprise, Digital Investigation, vol.8, issue.0, pp.101-110, 2011. ,
DOI : 10.1016/j.diin.2011.05.012
MapReduce, Proceedings of the 6th Symposium on Operating Systems Design and Implementation . USENIX, 2004. ,
DOI : 10.1145/1327452.1327492
Isolating a cloud instance for a digital forensic investigation, Proceedings of the 2011 Information Security for South Africa, 2011. ,
Cloud Computing: Issues and Challenges, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.27-33, 2010. ,
DOI : 10.1109/AINA.2010.187
Storage and exchange formats for digital evidence, Digital Investigation, vol.8, issue.2, pp.122-128, 2011. ,
DOI : 10.1016/j.diin.2011.09.002
Cloud computing and grid computing 360- degree compared. Computing Research Repository abs/0901, pp.1-10, 2009. ,
DOI : 10.1109/gce.2008.4738445
URL : http://arxiv.org/abs/0901.0131
Digital forensics research: The next 10 years, the Proceedings of the Tenth Annual DFRWS Conference, pp.64-73, 2010. ,
DOI : 10.1016/j.diin.2010.05.009
URL : https://calhoun.nps.edu/bitstream/10945/44251/1/Garfinkel_%20Digital_Forensics_2010.DFRWS.Next10Years.pdf
A virtual machine introspection based architecture for intrusion detection, Proceedings of the Network and Distributed System Security Symposium, 2003. ,
Gartner says worldwide cloud services market to surpass $68 billion in 2010, 2010. ,
Calm before the storm: The emerging challenges of cloud computing in digital forensics, 2011. ,
Forensic analysis of distributed service oriented computing platforms, 2011. ,
Guide to integrating forensic techniques into incident response, recommendations of the National Institute of Standards and Technology, 2006. ,
SMB Cloud Adoption Study, Global Report, 2010. ,
Design of a Forensic Overlay Model for Application Development, 2011. ,
HyperSpector, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05, pp.197-207, 2005. ,
DOI : 10.1145/1064979.1065006
Trail of bytes, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.50-60, 2010. ,
DOI : 10.1145/1866307.1866314
Cloud Security: A Comprehensive Guide to Secure Cloud Computing, 2010. ,
A survey of forensic analysis in virtualized environments, Tech. rep., Dartmouth College, 2011. ,
Pypette : A framework for the automated evaluation of live digital forensic techniques, Proceedings of the 11th Annual PostGraduate Symposium on The Convergence of Telecommunications Networking and Broadcasting, 2010. ,
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data, 2010. ,
Secure provenance, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.282-292, 2010. ,
DOI : 10.1145/1755688.1755723
Computer evidence v. daubert: The coming conflict, Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, 2005. ,
Cloud application logging for forensics, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.178-184, 2011. ,
DOI : 10.1145/1982185.1982226
Digital evidence and ?cloud? computing, Computer Law & Security Review, vol.27, issue.5, pp.524-528, 2011. ,
DOI : 10.1016/j.clsr.2011.07.005
The nist definition of cloud computing http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf 49 Outage in dublin knocks amazon, microsoft data centers offline, 2011. ,
Secure and Flexible Monitoring of Virtual Machines, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.385-397, 2007. ,
DOI : 10.1109/ACSAC.2007.10
Blue Skies and Storm Clouds, Journal of Digital Forensic Practice, vol.2, issue.2, pp.105-106, 2008. ,
DOI : 10.1080/15567280802047168
An Ad Hoc Review of Digital Forensic Models, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), pp.43-54, 2007. ,
DOI : 10.1109/SADFE.2007.3
Cloud computing: Forensic challenges for law enforcement, Proceedings of International Conference for Internet Technology and Secured Transactions ICITST 2010, pp.1-7, 2010. ,
Next-generation digital forensics, Communications of the ACM, vol.49, issue.2, pp.76-80, 2006. ,
DOI : 10.1145/1113034.1113074
Breaking the performance wall: The case for distributed digital forensics, Proceedings of the 2004 Digital Forensics Research Workshop, 2004. ,
Mmr: A platform for largescale forensic computing, Proceedings of the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2009. ,
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis, Proceedings of the 2011 ADFSL Conference on Digital Forensics, 2011. ,
DOI : 10.1016/j.diin.2013.02.004
Cloud Forensics, ) 59. Starcher, G.: Accessdata dna & amazon ec2, pp.35-49, 2011. ,
DOI : 10.1007/978-3-642-24212-0_3
URL : https://hal.archives-ouvertes.fr/hal-01523714
The phoenix system for mapreduce programming, 2011. ,
Digital evidence in cloud computing systems, Computer Law & Security Review, vol.26, issue.3, pp.304-308, 2010. ,
DOI : 10.1016/j.clsr.2010.03.002
Forensic investigation of cloud computing systems, Network Security, vol.2011, issue.3, pp.4-10, 2011. ,
DOI : 10.1016/S1353-4858(11)70024-1
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet, Advances in Digital Forensics VI, IFIP Advances in Information and Communication Technology, pp.37-48 ,
DOI : 10.1007/978-3-642-15506-2_3
URL : https://hal.archives-ouvertes.fr/hal-01060608
Foundations of computer forensics: A technology for the fight against computer crime, Computer Law & Security Review, vol.21, issue.2, pp.119-127, 2005. ,
DOI : 10.1016/j.clsr.2005.02.007
Overcast: Forensic Discovery in Cloud Environments, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.3-9, 2009. ,
DOI : 10.1109/IMF.2009.21
Cyber forensics in the cloud, the newsletter for information assurance technology professionals, 2011. ,
Distributed hash cracker: A cross-platform gpu-accelerated password recovery system, 2009. ,