{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795832,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490443","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"102-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital evidence detection in virtual environment for cloud computing"],"prefix":"10.1145","author":[{"given":"Digambar","family":"Powar","sequence":"first","affiliation":[{"name":"BITS-Pilani, Jawaharnagar, Shameerpet, Hyderabad"}]},{"given":"G.","family":"Geethakumari","sequence":"additional","affiliation":[{"name":"BITS-Pilani, Jawaharnagar, Shameerpet, Hyderabad"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"September","author":"Mell Peter","year":"2011","unstructured":"Peter Mell , Timothy Grance ,\" The NIST Definition of Cloud Computing\" , NIST Special Publication 800--145 , September , 2011 Peter Mell, Timothy Grance,\" The NIST Definition of Cloud Computing\", NIST Special Publication 800--145, September, 2011"},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber forensics in the cloud,\" in IANewsletter","author":"Glavach D.","year":"2011","unstructured":"D. Glavach and S. Zimmerman , \" Cyber forensics in the cloud,\" in IANewsletter , vol. 14 , number 1, Winter 2011 D. Glavach and S. Zimmerman, \"Cyber forensics in the cloud,\" in IANewsletter, vol.14, number 1, Winter 2011"},{"key":"e_1_3_2_1_3_1","unstructured":"www.vmware.com  www.vmware.com"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.forensicfocus.com\/downloads\/virtual-machines-forensics-analysis.pdf  http:\/\/www.forensicfocus.com\/downloads\/virtual-machines-forensics-analysis.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.liveview.sourceforge.net  http:\/\/www.liveview.sourceforge.net"},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.cyberforensics.in  http:\/\/www.cyberforensics.in"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.mountimage.com  http:\/\/www.mountimage.com"},{"key":"e_1_3_2_1_8_1","unstructured":"www.accessdata.com  www.accessdata.com"},{"key":"e_1_3_2_1_9_1","unstructured":"www.guidancesoftware.com  www.guidancesoftware.com"},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/www.softpedia.com\/get\/System\/OS-Enhancements\/Mojopac.shtml  http:\/\/www.softpedia.com\/get\/System\/OS-Enhancements\/Mojopac.shtml"},{"volume-title":"Last retrieved on","year":"2012","key":"e_1_3_2_1_11_1","unstructured":"www.techcast.org\/featuredarticledetails.aspx?id=233 , Last retrieved on May 2012 www.techcast.org\/featuredarticledetails.aspx?id=233, Last retrieved on May 2012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2120969.2121720"},{"key":"e_1_3_2_1_13_1","article-title":"Cloud Computing: Forensic challenges for Law Enforcement","author":"Wren C","year":"2010","unstructured":"C Wren , D. Reilly , T. Berry \" Cloud Computing: Forensic challenges for Law Enforcement \", Internet Technology and Secured Transactions, ICITST , 2010 C Wren, D. Reilly, T. Berry \"Cloud Computing: Forensic challenges for Law Enforcement\", Internet Technology and Secured Transactions, ICITST, 2010","journal-title":"Internet Technology and Secured Transactions, ICITST"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop on Cryptography and Security in Clouds","author":"Wegener Christoph","year":"2011","unstructured":"Christoph Wegener , Dominik Birk , \" Technical Issues of Forensic Investigations in Cloud Computing Environments\" , Workshop on Cryptography and Security in Clouds , March , 2011 , Zurich Christoph Wegener, Dominik Birk, \"Technical Issues of Forensic Investigations in Cloud Computing Environments\", Workshop on Cryptography and Security in Clouds, March, 2011, Zurich"},{"key":"e_1_3_2_1_17_1","unstructured":"D. Glavach S. Zimmerman \"Cyber forensics in the cloud \" in IANewsletter vol.14 number 1 Winter 2011  D. Glavach S. Zimmerman \"Cyber forensics in the cloud \" in IANewsletter vol.14 number 1 Winter 2011"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the IEEE International Conference on Internet Technology and Secured Transactions (ICITST)","author":"Biggs Stephen","year":"2009","unstructured":"Stephen Biggs , Stilianos Vidalis , Cloud Computing : The Impact on Digital Forensic Investigations , Proc. of the IEEE International Conference on Internet Technology and Secured Transactions (ICITST) , 2009 , pp: 1--6. Stephen Biggs, Stilianos Vidalis, Cloud Computing: The Impact on Digital Forensic Investigations, Proc. of the IEEE International Conference on Internet Technology and Secured Transactions (ICITST), 2009, pp: 1--6."}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":18,"alternative-id":["10.1145\/2490428.2490443","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490443","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}