{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:42:53Z","timestamp":1725709373655},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339615"},{"type":"electronic","value":"9783642339622"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33962-2_12","type":"book-chapter","created":{"date-parts":[[2012,12,8]],"date-time":"2012-12-08T04:51:33Z","timestamp":1354942293000},"page":"169-185","source":"Crossref","is-referenced-by-count":3,"title":["Finding File Fragments in the Cloud"],"prefix":"10.1007","author":[{"given":"Dirk","family":"Ras","sequence":"first","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1113034.1113070","volume":"49","author":"F. Adelstein","year":"2006","unstructured":"F. Adelstein, Live forensics: Diagnosing your system without killing it first, Communications of the ACM, vol. 49(2), pp. 63\u201366, 2006.","journal-title":"Communications of the ACM"},{"key":"12_CR2","unstructured":"Amazon Web Services, Amazon Elastic Compute Cloud (Amazon EC2), Seattle, Washington (\n \n aws.amazon.com\/ec2\n \n \n )."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/SADFE.2007.8","volume-title":"Proceedings of the Second IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"M. Andrew","year":"2007","unstructured":"M. Andrew, Defining a process model for forensic analysis of digital devices and storage media, Proceedings of the Second IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 16\u201330, 2007."},{"key":"12_CR4","volume-title":"Virtualization and Forensics: A Digital Forensic Investigator\u2019s Guide to Virtual Environments","author":"D. Barrett","year":"2010","unstructured":"D. Barrett, Virtualization and Forensics: A Digital Forensic Investigator\u2019s Guide to Virtual Environments, Syngress, Burlington, Massachusetts, 2010."},{"key":"12_CR5","volume-title":"SSH, The Secure Shell: The Definitive Guide","author":"D. Barrett","year":"2005","unstructured":"D. Barrett, R. Silverman and R. Byrnes, SSH, The Secure Shell: The Definitive Guide, O\u2019Reilly, Sebastopol, California, 2005."},{"key":"12_CR6","unstructured":"B. Carrier, Autopsy (\n \n www.sleuthkit.org\/autopsy\n \n \n )."},{"key":"12_CR7","unstructured":"B. Carrier, The Sleuth Kit (\n \n www.sleuthkit.org\/sleuthkit\n \n \n )."},{"volume-title":"Handbook of Digital Forensics and Investigations","year":"2010","key":"12_CR8","unstructured":"E. Casey (Ed.), Handbook of Digital Forensics and Investigations, Elsevier Academic Press, Burlington, Massachusetts, 2010."},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1108\/10650751011073607","volume":"26","author":"H. Cervone","year":"2010","unstructured":"H. Cervone, An overview of virtual and cloud computing, OCLC Systems and Services, vol. 26(3), pp. 162\u2013165, 2010.","journal-title":"OCLC Systems and Services"},{"key":"12_CR10","unstructured":"D. Chappell, Introducing the Windows Azure Platform, Technical Report, David Chappel and Associates, San Francisco, California, 2008."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1655008.1655022","volume-title":"Proceedings of the ACM Workshop on Cloud Computing Security","author":"M. Christodorescu","year":"2009","unstructured":"M. Christodorescu, R. Sailer, D. Schales, D. Sgandurra and D. Zamboni, Cloud security is not (just) virtualization security: A short paper, Proceedings of the ACM Workshop on Cloud Computing Security, pp. 97\u2013102, 2009."},{"key":"12_CR12","volume-title":"Digital Forensic Evidence Examination","author":"F. Cohen","year":"2010","unstructured":"F. Cohen, Digital Forensic Evidence Examination, ASP Press, Livermore, California, 2010."},{"key":"12_CR13","unstructured":"Google, Google Apps for Business, Mountain View, California (\n \n www.google.com\/apps\/intl\/en\/business\n \n \n )."},{"issue":"4","key":"12_CR14","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1147\/rd.524.0341","volume":"52","author":"S. Gopisetty","year":"2008","unstructured":"S. Gopisetty, S. Agarwala, E. Butler, D. Jadav, S. Jaquet, M. Korupolu, R. Routray, P. Sarkar, A. Singh, M. Sivan-Zimet, C. Tan, S. Uttamchandani, D. Merbach, S. Padbidri, A. Dieberger, E. Haber, E. Kandogan, C. Kieliszewski, D. Agrawal, M. Devarakonda, K. Lee, K. Magoutis, D. Verma and N. Vogl, Evolution of storage management: Transforming raw data into information, IBM Journal of Research and Development, vol. 52(4), pp. 341\u2013352, 2008.","journal-title":"IBM Journal of Research and Development"},{"key":"12_CR15","volume-title":"Practical Virtualization Solutions: Virtualization from the Trenches","author":"K. Hess","year":"2009","unstructured":"K. Hess and A. Newman, Practical Virtualization Solutions: Virtualization from the Trenches, Prentice-Hall, Boston, Massachusetts, 2009."},{"key":"12_CR16","volume-title":"Cloud Computing for Dummies","author":"J. Hurwitz","year":"2010","unstructured":"J. Hurwitz, R. Bloor, M. Kaufman and F. Halper, Cloud Computing for Dummies, Wiley, Hoboken, New Jersey, 2010."},{"key":"12_CR17","volume-title":"Computer Forensics: Incident Response Essentials","author":"W. Kruse","year":"2002","unstructured":"W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley, Indianapolis, Indiana, 2002."},{"key":"12_CR18","unstructured":"KVM Admin, Kernel Based Virtual Machine (\n \n www.linux-kvm.org\/page\/Main_Page\n \n \n )."},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1925109.1925111","volume":"29","author":"H. Lagar-Cavilla","year":"2011","unstructured":"H. Lagar-Cavilla, J. Whitney, R. Bryant, P. Patchin, M. Brudno, E. de Lara, S. Rumble, M. Satyanarayanan and A. Scannell, SnowFlock: Virtual machine cloning as a first-class cloud primitive, ACM Transactions on Computer Systems, vol. 29(1), pp. 2:1\u20132:45, 2011.","journal-title":"ACM Transactions on Computer Systems"},{"key":"12_CR20","volume-title":"Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data","author":"T. Lillard","year":"2010","unstructured":"T. Lillard, Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data, Syngress, Burlington, Massachusetts, 2010."},{"key":"12_CR21","volume-title":"Linux Clustering with CSM and GPFS","author":"E. Manoel","year":"2002","unstructured":"E. Manoel, C. Carlane, L. Ferreira, S. Hill, D. Leitko and P. Zutenis, Linux Clustering with CSM and GPFS, IBM Redbooks, Armonk, New York, 2002."},{"key":"12_CR22","unstructured":"P. Mell and T. Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011."},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1555271.1555277","volume-title":"Proceedings of the First Workshop on Automated Control for Datacenters and Clouds","author":"R. Moreno-Vozmediano","year":"2009","unstructured":"R. Moreno-Vozmediano, R. Montero and I. Llorente, Elastic management of cluster-based services in the cloud, Proceedings of the First Workshop on Automated Control for Datacenters and Clouds, pp. 19\u201324, 2009."},{"issue":"2","key":"12_CR24","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1147\/sj.422.0205","volume":"42","author":"R. Morris","year":"2003","unstructured":"R. Morris and B. Truskowski, The evolution of storage systems, IBM Systems Journal, vol. 42(2), pp. 205\u2013217, 2003.","journal-title":"IBM Systems Journal"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/SADFE.2010.28","volume-title":"Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"S. Naqvi","year":"2010","unstructured":"S. Naqvi, G. Dallons and C. Ponsard, Applying digital forensics in future Internet enterprise systems \u2013 European SME\u2019s perspective, Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 89\u201393, 2010."},{"key":"12_CR26","unstructured":"Nimbula, Nimbula Director User Guide, Mountain View, California, 2010."},{"issue":"4","key":"12_CR27","first-page":"1","volume":"2","author":"M. Noblett","year":"2000","unstructured":"M. Noblett, F. Church, M. Pollitt and L. Presley, Recovering and examining computer forensic evidence, Forensic Science Communications, vol. 2(4), p. 1\u201313, 2000.","journal-title":"Forensic Science Communications"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"G. Pangalos, C. Ilioudis and I. Pagkalos, The importance of corporate forensic readiness in the information security framework, Proceedings of the Nineteenth IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp. 12\u201316, 2010.","DOI":"10.1109\/WETICE.2010.57"},{"key":"12_CR29","unstructured":"D. Reilly, C. Wren and T. Berry, Cloud computing: Forensic challenges for law enforcement enforcement, Proceedings of the International Conference on Internet Technology and Secured Transactions, pp. 1\u20137, 2010."},{"key":"12_CR30","unstructured":"B. Siddhisena, L. Warusawithana and M. Mendis, Next generation multi-tenant virtualization cloud computing platform, Proceedings of the Thirteenth International Conference on Advanced Communication Technology, pp. 405\u2013410, 2011."},{"key":"12_CR31","unstructured":"Technical Working Group for Electronic Crime Scene Investigation, Electronic Crime Scene Investigation: A Guide for First Responders, NIJ Guide, NCJ 187736, U.S. Department of Justice, Washington, DC, 2001."},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/IUCS.2010.5666772","volume-title":"Proceedings of the Fourth International Universal Communication Symposium","author":"M. Zhou","year":"2010","unstructured":"M. Zhou, R. Zhang, D. Zeng and W. Qian, Services in the cloud computing era: A survey, Proceedings of the Fourth International Universal Communication Symposium, pp. 40\u201346, 2010."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33962-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:27:26Z","timestamp":1620131246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33962-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339615","9783642339622"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33962-2_12","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}