{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:14:05Z","timestamp":1725750845470},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398902"},{"type":"electronic","value":"9783642398919"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39891-9_3","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T01:28:17Z","timestamp":1380590897000},"page":"42-57","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Remnants of Evidence in the Cloud"],"prefix":"10.1007","author":[{"given":"Jeremy","family":"Koppen","sequence":"first","affiliation":[]},{"given":"Gerald","family":"Gent","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Bryan","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"DiPippo","sequence":"additional","affiliation":[]},{"given":"Jillian","family":"Kramer","sequence":"additional","affiliation":[]},{"given":"Marquita","family":"Moreland","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Fay-Wolfe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Information Technology Laboratory (2009), \n                    \n                      http:\/\/www.nist.gov\/itl\/cloud\/upload\/cloud-def-v15.pdf"},{"key":"3_CR2","unstructured":"Amazon, Inc., \n                    \n                      http:\/\/www.amazon.com\/"},{"key":"3_CR3","unstructured":"Apple iCloud, \n                    \n                      http:\/\/www.apple.com\/icloud\/"},{"key":"3_CR4","unstructured":"Dropbox, \n                    \n                      http:\/\/www.dropbox.com\/"},{"key":"3_CR5","unstructured":"Rackspace Cloud, \n                    \n                      http:\/\/www.rackspace.com\/cloud\/"},{"key":"3_CR6","unstructured":"Salesforce, Inc., \n                    \n                      http:\/\/www.salesforce.com\/"},{"key":"3_CR7","unstructured":"Skytap, Inc., \n                    \n                      http:\/\/www.skytap.com\/"},{"key":"3_CR8","unstructured":"Microsoft Corporation, Windows Live, \n                    \n                      http:\/\/explore.live.com\/"},{"key":"3_CR9","unstructured":"Google, \n                    \n                      http:\/\/www.google.com\/"},{"key":"3_CR10","unstructured":"Huawei Technologies Co., Ltd., \n                    \n                      http:\/\/www.huawei.com\/"},{"key":"3_CR11","unstructured":"Cisco Systems, Inc., \n                    \n                      http:\/\/www.cisco.com\/"},{"key":"3_CR12","unstructured":"Fujitsu, Ltd., \n                    \n                      http:\/\/www.fujitsu.com\/global\/"},{"key":"3_CR13","unstructured":"Dell, Inc., \n                    \n                      http:\/\/www.dell.com\/"},{"key":"3_CR14","unstructured":"Hewlett-Packard Development Company, L.P., \n                    \n                      http:\/\/www.hp.com\/"},{"key":"3_CR15","unstructured":"IBM, \n                    \n                      http:\/\/www.ibm.com\/"},{"key":"3_CR16","unstructured":"VMware, Inc., \n                    \n                      http:\/\/www.vmware.com\/"},{"key":"3_CR17","unstructured":"Hitachi, Ltd., \n                    \n                      http:\/\/www.hitachi.com\/"},{"key":"3_CR18","unstructured":"NetApp, Inc., \n                    \n                      http:\/\/www.netapp.com\/"},{"key":"3_CR19","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance (2009)"},{"key":"3_CR20","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risk and Compliance, p. 239. O\u2019Reilly Media (2009)"},{"key":"3_CR21","unstructured":"Federal Information Security Management ACT (FISMA) Implementation Project, \n                    \n                      http:\/\/csrc.nist.gov\/groups\/SMA\/fisma\/index.html"},{"key":"3_CR22","unstructured":"Health Information Privacy: The Health Insurance Portability and Accountability Act (HIPPA), \n                    \n                      http:\/\/www.hhs.gov\/ocr\/privacy\/"},{"key":"3_CR23","unstructured":"The Sarbanes-Oxley Act, \n                    \n                      http:\/\/www.soxlaw.com\/"},{"key":"3_CR24","unstructured":"PCI SSC Data Security Standards Overview, \n                    \n                      https:\/\/www.pcisecuritystandards.org\/security_standards\/index.php"},{"key":"3_CR25","unstructured":"SAS 70 Definition: Type II, \n                    \n                      http:\/\/www.sas70.us.com\/what-is\/definition-of-sas70.php"},{"key":"3_CR26","unstructured":"Kirilov, K.: Cloud Computing Market Will Top $241 Billion in 2020. Cloud Tweaks (2011), \n                    \n                      http:\/\/www.cloudtweaks.com\/2011\/04\/cloud-computing-market-will-top-241-billion-in-2020\/"},{"key":"3_CR27","unstructured":"Columbus, L.: Roundup of Cloud Computing Forecasts and Market Estimates. A Passion for Research (2012), \n                    \n                      http:\/\/softwarestrategiesblog.com\/2012\/01\/17\/roundup-of-cloud-computing-forecasts-and-market-estimates-2012\/"},{"key":"3_CR28","unstructured":"IDC Cloud Research, \n                    \n                      http:\/\/www.idc.com\/prodserv\/idc_cloud.jsp"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Bigsey, Cloud Computing and the Impact on Digital Forensic Investigations. ZDNet (2009), \n                    \n                      http:\/\/www.zdnet.co.uk\/blogs\/cloud-computing-and-the-impact-on-digital-forensic-investigations-10012285\/","DOI":"10.1109\/ICITST.2009.5402561"},{"key":"3_CR30","unstructured":"Access Data FTK, \n                    \n                      http:\/\/accessdata.com\/products\/computer-forensics\/ftk"},{"key":"3_CR31","unstructured":"EnCase Forensic v7, \n                    \n                      http:\/\/www.guidancesoftware.com\/encase-forensic.htm"},{"key":"3_CR32","unstructured":"X-Ways, \n                    \n                      http:\/\/www.x-ways.net\/"},{"key":"3_CR33","unstructured":"ATC P2P Marshal, \n                    \n                      http:\/\/p2pmarshal.atc-nycorp.com\/"},{"key":"3_CR34","unstructured":"ATC Mac Marshal, \n                    \n                      http:\/\/macmarshal.atc-nycorp.com\/"},{"key":"3_CR35","unstructured":"ATC Cyber Marshall Dropbox Reader, \n                    \n                      http:\/\/www.cybermarshal.com\/index.php\/cyber-marshal-utilities\/dropbox-reader"},{"key":"3_CR36","unstructured":"Gargoyle Investigator, \n                    \n                      http:\/\/www.wetstonetech.com\/cgi-bin\/shop.cgi?view,2"},{"key":"3_CR37","unstructured":"NetAnalysis, \n                    \n                      http:\/\/www.digital-detective.co.uk\/netanalysis.asp"},{"key":"3_CR38","unstructured":"JADsoftware\u2019s Internet Evidence Finder, \n                    \n                      http:\/\/www.jadsoftware.com\/internet-evidence-finder\/"},{"key":"3_CR39","unstructured":"RedLight, \n                    \n                      http:\/\/www.dfc.cs.uri.edu\/redlight.php"},{"key":"3_CR40","unstructured":"Process Monitor v3.01, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896645"},{"key":"3_CR41","unstructured":"PCMag InCtrl5, \n                    \n                      http:\/\/www.pcmag.com\/article2\/0,2817,25126,00.asp"},{"key":"3_CR42","unstructured":"Total Uninstall, \n                    \n                      http:\/\/www.martau.com\/"},{"key":"3_CR43","unstructured":"Spy Me, \n                    \n                      http:\/\/www.ghacks.net\/2009\/03\/01\/software-installation-monitor\/"},{"key":"3_CR44","unstructured":"Jones, K.J.: Forensic Analysis of Internet Explorer Activity Files (2003), \n                    \n                      http:\/\/www.mcafee.com\/us\/resources\/white-papers\/foundstone\/wp-pasco.pdf"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39891-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T13:33:18Z","timestamp":1558099998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39891-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398902","9783642398919"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39891-9_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}