[1] |
SIMSON L G . Digital forensics research: the next 10 years[J]. Digital Investigation, 2010,(7):64-73.
|
[2] |
WOLTHUSEN S D . Overcast: forensic discovery in cloud environ-ments[A]. The 5th International Conference on IT Security Incident Manage ment and IT Forensics[C]. Stuttgart, 2009. 3-9.
|
[3] |
KEYUN R, , JOE C , TAHAR K , et al . Cloud forensics: an overview[A]. 7th IFIP Conference on Digital Forensics[C]. Florida,USA, 2011. 35-46.
|
[4] |
BIGGS S , VIDALIS S . Cloud computing: the impact on digital foren-sic investigations[A]. International Conference for Internet Technol-ogy and Secured Transactions[C]. London,Engloud, 2009. 1-6.
|
[5] |
BIRK D , WEGENER C . Technical issues of forensic investigations in cloud computing environments[A]. IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering[C]. Oak-land, 2011. 1-10.
|
[6] |
Eucalyptus[EB/OL]. http://www.eucalyptus.com/.
|
[7] |
NURMI D , WOLSKI R , GRZEGORCZYK C , et al . The eucalyptus open-source cloud-computing system[A]. IEEE/ACM International Sym-posium on Cluster Computing and the Grid[C]. Shanghai,China, 2009. 124-131.
|
[8] |
KEYUN R , IBRAHIM B , JOE C , et al . Survey on cloud forensics and critical criteria for cloud forensic capability: a preliminary analysis[A]. Proceedings of the ADFSL Conference on Digital Forensics,Security and Law[C]. Virginia,USA, 2011. 105-121.
|
[9] |
REILLY D , WREN C , BERRY T . Cloud computing: forensic challenges for law enforcement[A]. International Conference for Internet Technology and Secured Transactions[C]. London,En-gloud, 2010. 1-7.
|
[10] |
ELIE B , IVAN F , MATTHIEU M , et al . Doing forensics in the cloud age OWADE: beyond files recovery forensic[A]. Black Hat[C]. Las-Vegas,USA, 2011. 1-23.
|
[11] |
ZAFARULLAH Z , ANWAR F , ANWAR Z . Digital forensics for eucalyptus[A]. Frontiers of Information Technology[C]. Islamabad, 2011. 110-116.
|
[12] |
周刚 . 云计算环境中面向取证的现场迁移技术研究[D]. 武汉: 华中科技大学, 2011.
|
[13] |
WU J Z , DING L P , WANG Y J , et al . Identification and evaluation of sharing memory covert timing channel in xen virtual machines[A]. IEEE 4th Conference on Cloud Computing[C]. Washington DC,USA, 2011. 283-291.
|
[14] |
WU J Z , DING L P , LIN Y Q , et al . Xenpump: a new method to miti-gate timing channel in cloud computing[A]. IEEE 5th Conference on Cloud Computing[C]. Hawaii,USA, 2012. 678-685.
|
[15] |
PAUL B , BORIS D , KEIR F , et al . Xen and the art of virtualization[A]. Proceedings of the Nineteenth ACM Symposium on Operating Sys-tems Principles[C]. New York,USA, 2003. 164-177.
|
[16] |
XU W , HUANG L , FOX A , et al . Detecting large-scale system prob-lems by mining console logs[A]. Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Priciples[C]. New York,USA, 2009. 117-132.
|
[17] |
HU Z B , SU J , SHIROCHIN V P . An intelligent lightweight intrusion detection system with forensics technique[A]. 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems:Technology and Applications[C]. Dortmund, 2007. 647-651.
|
[18] |
CVE-2008-4250[EB/OL].
|