1 |
Shin, S. S. (2011). The Model Proposal of Mobile Cloud Security Technology. The Journal of The Institute of Internet, Broadcasting and Communication, 11(6), 151-156
과학기술학회마을
|
2 |
Choo, K. K. R. (2010). Cloud computing: challenges and future directions. Trends & Issues in Crime and Criminal Justice, (400), 381-400.
|
3 |
Lallie, H. S., & Pimlott, L. (2012). Challenges in Applying the ACPO Principles in Cloud Forensic Investigations. Journal of Digital Forensics, Security and Law, 7(1). Retrieved from http://ojs.jdfsl.org/index.php/jdfsl/article/view/32
|
4 |
SWGDE (2011). SWGDE/SWGIT Digital & Multimedia Evidence Glossary Version 2.4. Tech. rep. Scientific Working Groups on Digital Evidence and Imaging Technology, p. 18.
|
5 |
Gellman, R. (2009). Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf
|
6 |
Park. C.S. (2011). Study on Security Considerations in the Cloud Computing. Journal of the Korea Academia-Industrial cooperation Society. 12(3): 1408-1416.
DOI
ScienceOn
|
7 |
O'Shaughnessy, S., & Keane, A. (2013). Impact of Cloud Computing on Digital Forensic Investigations. In G. Peterson & S. Shenoi (Eds.), (pp. 291-303). Springer Berlin Heidelberg.
|
8 |
Ruan, Keyun et al. (2013). "Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results". In: Digital Investigation 10.1, pp. 34-43.
DOI
ScienceOn
|
9 |
Saliba, Jad (2012). Finding Evidence in an Online World-Trends and Challenges in Digital Forensics. url:http://www.forensicfocus.com/DF\_Multimedia/page=watch/id=79/d=1/.
|
10 |
Saliba, Jad. (2012). Finding Evidence in an Online World-Trends and Challenges in Digital Forensics. url:http://www.forensicfocus.com/DF\_Multimedia/page=watch/id=79/d=1/.
|
11 |
Ruan, Keyun et al. (2011). "Cloud forensics: An overview". In: Advances in Digital Forensics VII 361, pp. 35-46.
DOI
|