214
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

FReadyPass: a digital forensic ready passport to control access to data across jurisdictional boundaries

&
Pages 583-595 | Received 01 Dec 2017, Accepted 06 Feb 2018, Published online: 05 Apr 2018

References

  • Reilly D , Wren C , Berry T . Cloud computing: forensic challenges for law enforcement. IEEE. 2010:1–7.
  • Giova G . Improving chain of custody in forensic investigation of electronic digital systems. Int J Comput Sci Network Secur. 2011;11(1):1–9.
  • Mell P , Grance T . The NIST definition of cloud computing. Information Technology Laboratory - Computer Security Division; 2011.
  • Pearson S , Benameur A . Privacy, security and trust issues arising from cloud computing. IEEE. 2010:693–702.
  • Palmer G . A road map for digital forensic research. First Digital Forensic Research Workshop (DFRWS); 2001.
  • Barbara JJ . Cloud computing: another digital forensic challenge. Digital Forensic Investigator News. 2009 October.
  • Rowlingson R. A ten step process for forensic readiness. Int J Digital Evidence. 2004;2 (3):1–28.
  • Birk D , Wegener C . Technical issues of forensic investigations in cloud computing environments. In: Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE); 2011. p. 1-11.
  • Muniswamy-Reddy K-K , Seltzer M . Provenance as first class cloud data. ACM SIGOPS Oper Syst Rev. 2010;43(4):11–16.10.1145/1713254
  • Lu R , Lin X , Liang X , Shen XS . Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM; 2010. p. 282–292.
  • Trenwith PM , Venter HS . A digital forensic model for providing better data provenance in the cloud. Inf Secur S Afr. 2014:1–6.
  • Muniswamy-Reddy KK , Braun U , Holland DA , Macko P , Maclean D , Margo D , Seltzer M , Smogor R . Layering in provenance systems. In: Proceedings of the 2009 USENIX Annual Technical Conference; 2009.
  • Shi Y , Zhang K , Li Q . A new data integrity verification mechanism for SaaS. In: Web Information Systems and Mining. Springer; 2010. p. 236–243.10.1007/978-3-642-16515-3
  • Juels A , Kaliski Jr BS . PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security; 2007. p. 584–597.
  • Zimmermann P . A proposed standard format for RSA Cryptosystems. September 1986;19(9):21–34.
  • Rivest RL , Shamir A , Adleman L . A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–126.10.1145/359340.359342
  • Rivest RL , Shamir A , Adleman L . A method for obtaining digital signatures and public-key cryptosystems. Commun ACM . Special 25th Anniversary Issue. 1983;26 (1):96–99.
  • Elgamal T . A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory. July 1985;31(4):469–472.
  • Fall KR , Stevens WR . TCP/IP illustrated. Volume 1. The protocols. Addison-Wesley; 2011.
  • IANA . IANA; 2015. Available from: www.iana.org
  • Gilbert H , Handschuh H . Security analysis of SHA-256 and sisters. In: International workshop on selected areas in cryptography. Springer; 2003. p. 175–193.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.