{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:42:53Z","timestamp":1725709373960},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339615"},{"type":"electronic","value":"9783642339622"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33962-2_14","type":"book-chapter","created":{"date-parts":[[2012,12,8]],"date-time":"2012-12-08T04:51:33Z","timestamp":1354942293000},"page":"201-212","source":"Crossref","is-referenced-by-count":18,"title":["Key Terms for Service Level Agreements to Support Cloud Forensics"],"prefix":"10.1007","author":[{"given":"Keyun","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Joshua","family":"James","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Carthy","sequence":"additional","affiliation":[]},{"given":"Tahar","family":"Kechadi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Amazon, Amazon Web Services: Overview of Security Processes, Seattle, Washington (\n                    \n                      aws.amazon.com\/articles\/1697\n                    \n                    \n                  ), 2008."},{"key":"14_CR2","unstructured":"Association of Chief Police Officers, Good Practice Guide for Computer-Based Electronic Evidence, London, United Kingdom (\n                    \n                      www.7safe.com\/electronic_evidence\/ACPO_guidelines_computer_evidence.pdf\n                    \n                    \n                  ), 2008."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-04155-6_2","volume-title":"Advances in Digital Forensics V","author":"N. Beebe","year":"2009","unstructured":"N. Beebe, Digital forensic research: The good, the bad and the unaddressed, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 17\u201336, 2009."},{"key":"14_CR4","unstructured":"B. Gammage, D. Plummer, R. Valdes, K. McGee, K. Potter, S. Tan, D. Aron, R. Hunter, J. Heiser, B. Prentice, G. Alvarez, M. Basso, L. Fiering and K. Dulaney, Gartner\u2019s Top Predictions for IT Organizations and Users, 2011 and Beyond: IT\u2019s Growing Transparency, Document ID Number G00208367, Gartner, Stamford, Connecticut, 2010."},{"key":"14_CR5","unstructured":"P. Mell and T. Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011."},{"key":"14_CR6","unstructured":"R. Mogull, Cloud Data Security: Archive and Delete (Rough Cut), Securosis, Phoenix, Arizona (\n                    \n                      securosis.com\/blog\/cloud-data-security-archive-and-delete-rough-cut\n                    \n                    \n                  ), 2011."},{"key":"14_CR7","unstructured":"T. Osborne, Building an Incident Response Program to Suit Your Business, InfoSec Reading Room, SANS Institute, Bethesda, Maryland (\n                    \n                      www.sans.org\/reading_room\/whitepapers\/incident\/building-incident-response-program-suit-business_627\n                    \n                    \n                  ), 2001."},{"key":"14_CR8","first-page":"199","volume-title":"Proceedings of the Sixteenth ACM Conference on Computer and Communications Security","author":"T. Ristenpart","year":"2009","unstructured":"T. Ristenpart, E. Tromer, H. Shacham and S. Savage, Hey you, get off of my cloud: Exploring information leakage in third-party compute clouds, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 199\u2013212, 2009."},{"key":"14_CR9","volume-title":"Proceedings of the Sixth Annual Conference on Digital Forensics, Security and Law","author":"K. Ruan","year":"2011","unstructured":"K. Ruan, I. Baggili, J. Carthy and T. Kechadi, Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis, Proceedings of the Sixth Annual Conference on Digital Forensics, Security and Law, 2011."},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-24212-0_3","volume-title":"Advances in Digital Forensics VII","author":"K. Ruan","year":"2011","unstructured":"K. Ruan, J. Carthy, M. Kechadi and M. Crosbie, Cloud forensics, in Advances in Digital Forensics VII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 35\u201346, 2011."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33962-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:27:27Z","timestamp":1620131247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33962-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339615","9783642339622"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33962-2_14","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}