{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:10:55Z","timestamp":1725495055462},"publisher-location":"New York, NY","reference-count":18,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_22","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"317-327","source":"Crossref","is-referenced-by-count":2,"title":["Applying The Biba Integrity Model to Evidence Management"],"prefix":"10.1007","author":[{"given":"Kweku","family":"Arthur","sequence":"first","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]},{"given":"Hein","family":"Venter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"AccessData, Forensic Toolkit (FTK) ( http:\/\/www.accessdata.com )."},{"key":"22_CR2","unstructured":"Aprisma, Event correlation in Spectrum and other commercial products ( http:\/\/www.aprisma.com\/literature\/white-papers\/wp0551.pdf ), 2000."},{"issue":"3","key":"22_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/S0267-3649(03)00306-6","volume":"19","author":"K. Burden","year":"2003","unstructured":"K. Burden and C. Palmer, Cyber crime \u2014 A new breed of criminal? Computer Law and Security Report, vol. 19(3), pp. 222\u2013227, 2003.","journal-title":"Computer Law and Security Report"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"L. Burns, J. Hellerstein, S. Ma, C. Perng, D. Rabenhorst and D. Taylor, Towards discovery of event correlation rules, Proceedings of the IEEE\/IFIP International Symposium on Integrated Network Management, pp. 345\u2013359, 2001.","DOI":"10.1109\/INM.2001.918052"},{"key":"22_CR5","unstructured":"E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol. 1(2), 2002."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"H. Doernemann, Tool-based risk management made practical, Proceedings of the IEEE Joint Conference on Requirements Engineering, p. 192, 2002.","DOI":"10.1109\/ICRE.2002.1048523"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"D. Forte, The art of log correlation: Tools and techniques for correlating events and log files, Computer Fraud and Security, pp. 7\u201311, June 2004.","DOI":"10.1016\/S1361-3723(04)00075-2"},{"key":"22_CR8","unstructured":"L. Gordon, M. Loeb, W. Lucyshyn and R. Richardson, 2006 CSI\/FBI Computer Crime and Security Survey, Computer Security Institute ( http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI2006.pdf ), 2006."},{"key":"22_CR9","volume-title":"CISSP Certification","author":"S. Harris","year":"2005","unstructured":"S. Harris, CISSP Certification, McGraw-Hill Osborne, Emeryville, California, 2005."},{"issue":"1","key":"22_CR10","first-page":"1","volume":"1","author":"C. Hosmer","year":"2002","unstructured":"C. Hosmer, Proving the integrity of digital evidence with time, International Journal of Digital Evidence, vol. 1(1), pp. 1\u20137, 2002.","journal-title":"International Journal of Digital Evidence"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"R. Morris, Options in computer forensic tools, Computer Fraud and Security, pp. 8\u201311, November 2002.","DOI":"10.1016\/S1361-3723(02)01108-9"},{"key":"22_CR12","unstructured":"A. Muscat, A log-analysis-based intrusion detection system for the creation of a specification-based intrusion prevention system, Proceedings of the University of Malta Annual Computer Science Research Workshop, 2003."},{"key":"22_CR13","unstructured":"National Institute of Standards and Technology (NIST), National Software Reference Library ( http:\/\/www.nsrl.nist.gov )."},{"key":"22_CR14","volume-title":"Security in Computing","author":"C. Pfleeger","year":"2003","unstructured":"C. Pfleeger and S. Lawrence-Pfleeger, Security in Computing, Prentice Hall, Upper Saddle River, New Jersey, 2003."},{"key":"22_CR15","unstructured":"B. Smith, Thinking about security monitoring and event correlation ( http:\/\/www.lurhq.com\/confarticle.htm )."},{"issue":"1","key":"22_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.diin.2004.01.007","volume":"1","author":"P. Stephenson","year":"2004","unstructured":"P. Stephenson, The right tools for the job, Digital Investigation, vol. 1(1), pp. 24\u201327, 2004.","journal-title":"Digital Investigation"},{"key":"22_CR17","unstructured":"H. Tipton, Integrity models ( http:\/\/www.ccert.edu.cn\/education\/cissp\/hism\/023-026.html )."},{"key":"22_CR18","volume-title":"Information Security Architecture: An Integrated Approach to Security in the Organization","author":"J. Tudor","year":"2001","unstructured":"J. Tudor, Information Security Architecture: An Integrated Approach to Security in the Organization, Auerbach\/CRC Press, Boca Raton, Florida, 2001."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:18Z","timestamp":1619669838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_22","relation":{},"subject":[]}}