{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T15:14:39Z","timestamp":1748963679272},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_8","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"135-151","source":"Crossref","is-referenced-by-count":4,"title":["One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique"],"prefix":"10.1007","author":[{"given":"Simson L.","family":"Garfinkel","sequence":"first","affiliation":[]},{"given":"David J.","family":"Malan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Redacting with confidence: How to safely publish sanitized reports converted from word to pdf. Technical Report I333-015R-2005, Architectures and Applications Division of the Systems and Network Attack Center (SNAC), Information Assurance Directorate, National Security Agency (2005)"},{"key":"8_CR2","unstructured":"Acronis, Inc., http:\/\/www.acronis.com\/"},{"key":"8_CR3","unstructured":"Apple Computer, Inc. Apple Disk Utility (2006)"},{"key":"8_CR4","unstructured":"Bauer, S., Priyantha, N.B.: Secure data deletion for Linux file systems. In: Proc. 10th Usenix Security Symposium, San Antonio, Texas, Usenix, pp. 153\u2013164 (2001)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Burke, P.K., Craiger, P.: Digital Trace Evidence from Secure Deletion Programs. In: Proceedings of the Second Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida (January 2006)","DOI":"10.1007\/0-387-36891-4_15"},{"key":"8_CR6","unstructured":"Carrier, B.: The Sleuth Kit & Autopsy: Forensics tools for Linux and other Unixes (2005)"},{"key":"8_CR7","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proc. of the 13th Usenix Security Symposium, Usenix (August 9\u201313, 2004)"},{"key":"8_CR8","unstructured":"Microsoft Corporation. How To Use Cipher.exe to Overwrite Deleted Data in Windows (July 2004)"},{"key":"8_CR9","unstructured":"Microsoft Corporation. Windows 2000 Security Tool: New Cipher.exe Tool (March 2004), http:\/\/www.microsoft.com\/downloads\/release.asp?releaseid=30925"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/3-540-49116-3_47","volume-title":"STACS 99","author":"G. Crescenzo Di","year":"1999","unstructured":"Di Crescenzo, G., Fergurson, N., Impagliazzo, R., Jakobsson, M.: How to forget a secret. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol.\u00a01563, pp. 500\u2013509. Springer, Heidelberg (1999)"},{"key":"8_CR11","unstructured":"CyberScrub LLC, http:\/\/www.cyberscrub.com\/"},{"key":"8_CR12","unstructured":"Cleaning and sanitization matrix, ch.8 (January 1995)"},{"key":"8_CR13","unstructured":"EAST Technologies, http:\/\/www.east-tec.com\/"},{"key":"8_CR14","unstructured":"Garfinkel, S.L.: Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable. PhD thesis, MIT, Cambridge, MA (April 26, 2005)"},{"key":"8_CR15","volume-title":"Research Advances in Digital Forensics (Second Annual IFIP WG 11.9 International Conference on Digital Forensics)","author":"S.L. Garfinkel","year":"2006","unstructured":"Garfinkel, S.L., Malan, D.J., Dubec, K.-A., Stevens, C.C., Pham, C.: Disk imaging with the advanced forensic format, library and tools. In: Research Advances in Digital Forensics (Second Annual IFIP WG 11.9 International Conference on Digital Forensics), Springer, Heidelberg (2006)"},{"key":"8_CR16","unstructured":"Trant, G.: Eraser, http:\/\/www.heidi.ie\/eraser\/"},{"key":"8_CR17","unstructured":"Geiger, M.: Evaluating Commercial Counter-Forensic Tools. In: Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, Louisiana (August 2005)"},{"key":"8_CR18","unstructured":"Guidance Software, Inc. EnCase Forensic"},{"key":"8_CR19","unstructured":"Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, Usenix (1996) (Online paper has been updated since presentation in 1996)"},{"key":"8_CR20","unstructured":"IDM Computer Solutions, Inc., http:\/\/www.ultrasentry.com\/"},{"key":"8_CR21","unstructured":"Mark Russinovich. SDelete (2003)"},{"key":"8_CR22","unstructured":"Russinovich, M., Cogswell, B.: Filemon for Windows"},{"key":"8_CR23","unstructured":"Microsoft. Cipher.exe security tool for the encrypting file system (January 31, 2006)"},{"key":"8_CR24","unstructured":"NeoImagic Computing, Inc., http:\/\/www.neoimagic.com\/"},{"key":"8_CR25","unstructured":"Onley, D.S.: Pdf user slip-up gives dod lesson in protecting classified information. Government Computer News\u00a024 (April 16, 2005)"},{"key":"8_CR26","unstructured":"Poulsen, K.: Justice e-censorship gaffe sparks controversy. In: SecurityFocus (October 23, 2003)"},{"key":"8_CR27","unstructured":"Robin Hood Software Ltd., http:\/\/www.evidence-eliminator.com\/"},{"key":"8_CR28","unstructured":"Rowe, N.C.: Automatic detection of fake file systems. In: International Conference on Intelligence Analysis Methods and Tools (May 2005)"},{"key":"8_CR29","unstructured":"Shankland, S., Ard, S.: Document shows SCO prepped lawsuit against BofA. In: News.Com (March 4, 2004)"},{"key":"8_CR30","unstructured":"Stone, K., Keightley, R.: Can Computer Investigations Survive Windows XP? Technical report, Guidance Software, Pasadena, California (December 2001)"},{"key":"8_CR31","unstructured":"Webroot Software, Inc., http:\/\/www.webroot.com\/"},{"key":"8_CR32","unstructured":"WhiteCanyon, Inc., http:\/\/www.whitecanyon.com\/"},{"issue":"2","key":"8_CR33","first-page":"18","volume":"6","author":"W.D. Young","year":"1986","unstructured":"Young, W.D., Boebeit, W.E., Kain, R.Y.: Proving a computer system secure. The Scientific Honeyweller\u00a06(2), 18\u201327 (1985); Reprinted in Abrams, M.D., Podell, H. J.(eds.): Computer and Network Security, IEEE Computer Security Press, New York (1986)","journal-title":"The Scientific Honeyweller"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/91556.91597","volume-title":"LFP 1990: Proceedings of the 1990 ACM conference on LISP and functional programming","author":"B. Zorn","year":"1990","unstructured":"Zorn, B.: Comparing mark-and sweep and stop-and-copy garbage collection. In: LFP 1990: Proceedings of the 1990 ACM conference on LISP and functional programming, pp. 87\u201398. ACM Press, New York (1990)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:41Z","timestamp":1619508101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/11957454_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}