{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:59:37Z","timestamp":1760623177600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3407064","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T16:32:52Z","timestamp":1596126772000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A privacy-aware digital forensics investigation in enterprises"],"prefix":"10.1145","author":[{"given":"Ludwig","family":"Englbrecht","sequence":"first","affiliation":[{"name":"University of Regensburg, Regensburg, Germany"}]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[{"name":"University of Regensburg, Regensburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2011.13"},{"key":"e_1_3_2_1_2_1","first-page":"311","article-title":"A survey on privacy issues in digital forensics","volume":"1","author":"Aminnezhad Asou","year":"2012","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.003"},{"key":"e_1_3_2_1_4_1","volume-title":"USA","volume":"182","author":"Breitinger Frank","year":"2012"},{"volume-title":"Symposium on Critical Infrastructure Protection and the Law.","year":"2002","author":"Burmester Mike","key":"e_1_3_2_1_5_1"},{"volume-title":"Selective and Secure Deletion of Digital Evidence. In International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","year":"2011","author":"Castiglione Aniello","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.03.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/288627.288651"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.222"},{"volume-title":"Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics. In 2011 Third International Conference on Multimedia Information Networking and Security. 595--599","author":"Hou S.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354777"},{"volume-title":"Protecting Digital Data Privacy in Computer Forensic Examination. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","year":"2011","author":"Law Frank Y.W.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"David E. Losada Juan M. Fern\u00e1ndez-Luna Cyril Goutte and Eric Gaussier (Eds.). 2005. A Probabilistic Interpretation of Precision Recall and F-Score with Implication for Evaluation: Advances in Information Retrieval. Springer Berlin Heidelberg.  David E. Losada Juan M. Fern\u00e1ndez-Luna Cyril Goutte and Eric Gaussier (Eds.). 2005. A Probabilistic Interpretation of Precision Recall and F-Score with Implication for Evaluation: Advances in Information Retrieval. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_15_1","first-page":"482","article-title":"System and Method for Entropy-Based Near-Match Analysis","volume":"12","author":"McCreight Shawn","year":"2010","journal-title":"US Patent App."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.246"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"volume-title":"Proceedings 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, Calif, 44--55","author":"Song Dawn Xiaoding","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Security and privacy vs. computer forensics capabilities","volume":"4","author":"Srinivasan S.","year":"2007","journal-title":"Information Systems Control Journal"},{"volume-title":"Selective Imaging Revisited. In Seventh International Conference on IT Security Incident Management and IT Forensics (IMF)","year":"2013","author":"St\u00fcttgen Johannes","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-0496(09)90065-0"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.003"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"volume-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security.","year":"2001","author":"Yasinsac Alec","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.01.006"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:42Z","timestamp":1750195482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":27,"alternative-id":["10.1145\/3407023.3407064","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3407064","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}