{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:29Z","timestamp":1725751649062},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_20","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T14:47:31Z","timestamp":1381330051000},"page":"291-303","source":"Crossref","is-referenced-by-count":13,"title":["Impact of Cloud Computing on Digital Forensic Investigations"],"prefix":"10.1007","author":[{"given":"Stephen","family":"O\u2019Shaughnessy","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Keane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Association of Chief Police Officers, Good Practice Guide for Computer-Based Evidence, London, United Kingdom, 2012."},{"key":"20_CR2","unstructured":"L. Badger, R. Bohn, S. Chu, M. Hogan, F. Liu, V. Kaufmann, J. Mao, J. Messina, K. Mills, A. Sokol, J. Tong, F. Whiteside and D. Leaf, U.S. Government Cloud Computing Technology Roadmap, Volume II, Release 1.0 (Draft), Useful Information for Cloud Adopters, NIST Special Publication 500-293, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011."},{"key":"20_CR3","volume-title":"Proceedings of the Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"D. Birk","year":"2011","unstructured":"D. Birk and C. Wegener, Technical issues of forensic investigations in cloud computing environments, Proceedings of the Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011."},{"key":"20_CR4","unstructured":"D. Bryan and M. Anderson, Cloud computing, A weapon of mass destruction? presented at the DEFCON 18 Hacking Conference, 2010."},{"key":"20_CR5","unstructured":"B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"20_CR6","unstructured":"S. Garfinkel, The criminal cloud, MIT Technology Review, October 17, 2011."},{"key":"20_CR7","unstructured":"D. Garrie, Cloud computing and jurisdiction, Part 2: A primer, Law and Forensics, Seattle, Washington (\n \n www.lawandforensics.com\/cloud-computing-jurisdiction-part-primer\n \n \n ), 2012."},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1773912.1773926","volume":"44","author":"A. Haeberlen","year":"2010","unstructured":"A. Haeberlen, A case for the accountable cloud, ACM SIGOPS Operating Systems Review, vol. 44(2), pp. 52\u201357, 2010.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.","DOI":"10.6028\/NIST.SP.800-144"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-04155-6_20","volume-title":"Advances in Digital Forensics V","author":"S. Liles","year":"2009","unstructured":"S. Liles, M. Rogers and M. Hoebich, A survey of the legal issues facing digital forensic experts, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 267\u2013276, 2009."},{"key":"20_CR11","first-page":"282","volume-title":"Proceedings of the Fifth ACM Conference on Computer and Communications Security","author":"R. Lu","year":"2010","unstructured":"R. Lu, X. Lin, X. Liang and X. Shen, Secure provenance: The essential of bread and butter of data forensics in cloud computing, Proceedings of the Fifth ACM Conference on Computer and Communications Security, pp. 282-292, 2010."},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"P. Mell and T. Grance, The NIST Definition of Cloud Computing, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"20_CR13","unstructured":"G. Palmer, A Road Map for Digital Forensic Research \u2013 Report from the First Digital Forensic Research Workshop, DFRWS Technical Report, DTR-T001-01 FINAL, Air Force Research Laboratory, Rome, New York, 2001."},{"key":"20_CR14","first-page":"199","volume-title":"Proceedings of the Sixteenth ACM Conference on Computer and Communications Security","author":"T. Ristenpart","year":"2009","unstructured":"T. Ristenpart, E. Tromer, H. Schacham and S. Savage, Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp 199\u2013212, 2009."},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-24212-0_3","volume-title":"Advances in Digital Forensics VII","author":"K. Ruan","year":"2011","unstructured":"K. Ruan, J Carthy, T. Kechadi and M. Crosbie, Cloud forensics, in Advances in Digital Forensics VII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp 35\u201346, 2011."},{"key":"20_CR16","unstructured":"J. Vacca, Computer Forensics: Computer Crime Scene Investigation, Charles River Media, Hingham, Massachusetts, 2002."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T17:02:57Z","timestamp":1558112577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}