REFERENCES
An, J. H. (2001). Authenticated encryption in the public-key
setting: Security notions and analyses. IACR Cryptol-
ogy ePrint Archive, 2001:79.
Bellare, M. and Yee, B. (2003). Forward-security in private-
key cryptography. In Topics in Cryptology—CT-RSA
2003, pages 1–18. Springer.
Bernstein, D. J., Lange, T., and Schwabe, P. (2012). The
security impact of a new cryptographic library. In
Hevia, A. and Neven, G., editors, Progress in Cryptol-
ogy - LATINCRYPT 2012 - 2nd International Confer-
ence on Cryptology and Information Security in Latin
America, Santiago, Chile, October 7-10, 2012. Pro-
ceedings, volume 7533 of Lecture Notes in Computer
Science, pages 159–176. Springer.
Bowers, K. D., Hart, C., Juels, A., and Triandopoulos, N.
(2014). PillarBox: Combating Next-Generation Mal-
ware with Fast Forward-Secure Logging. In Research
in Attacks, Intrusions and Defenses Symposium, vol-
ume 8688, pages 46–67. Springer.
Dingledine, R., Mathewson, N., and Syverson, P. F. (2004).
Tor: The second-generation onion router. In Blaze,
M., editor, Proceedings of the 13th USENIX Security
Symposium, August 9-13, 2004, San Diego, CA, USA,
pages 303–320. USENIX.
Doelitzscher, F., Reich, C., Knahl, M., Passfall, A., and
Clarke, N. (2012). An Agent Based Business Aware
Incident Detection System for Cloud Environments.
Journal of Cloud Computing: Advances, Systems and
Applications, 1(1):9.
Doelitzscher, F., Ruebsamen, T., Karbe, T., Reich, C., and
Clarke, N. (2013). Sun behind clouds - on automatic
cloud security audits and a cloud audit policy lan-
guage. International Journal On Advances in Net-
works and Services, 6(1 & 2).
Gupta, A. (2013). Privacy preserving efficient digital foren-
sic investigation framework. In Contemporary Com-
puting (IC3), 2013 Sixth International Conference on,
pages 387–392.
Haeberlen, A. (2009). A case for the accountable cloud.
In Proceedings of the 3rd ACM SIGOPS International
Workshop on Large-Scale Distributed Systems and
Middleware (LADIS’09).
JADE (2015). Java Agent DEvelopement framework.
http://jade.tilab.com.
Jansen, W. and Grance, T. (2011). Sp 800-144. guidelines
on security and privacy in public cloud computing.
Technical report, Gaithersburg, MD, United States.
Lopez, J., Ruebsamen, T., and Westhoff, D. (2014).
Privacy-friendly cloud audits with somewhat homo-
morphic and searchable encryption. In Innovations for
Community Services (I4CS), 2014 14th International
Conference on, pages 95–103.
Microsoft Developer Network (2015). The Stride
Threat Model. https://msdn.microsoft.com/en-
US/library/ee823878(v=cs.20).aspx.
Mohay, G. M., Anderson, A. M., Collie, B., de Vel, O., and
McKemmish, R. D. (2003). Computer and Intrusion
Forensics. Artech House, Boston, MA, USA. For
more information about this book please refer to the
publisher’s website (see link) or contact the authors.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. Consulted, 1(2012):28.
OpenStack (2015). Openstack. http://www.openstack.org/.
Pearson, S. (2011). Toward accountability in the cloud. In-
ternet Computing, IEEE, 15(4):64–69.
Pulls, T. and Peeters, R. (2015a). Balloon: A
forward-secure append-only persistent authenticated
data structure. Cryptology ePrint Archive, Report
2015/007.
Pulls, T. and Peeters, R. (2015b). Insynd: Secure one-
way messaging through Balloons. Cryptology ePrint
Archive, Report 2015/150.
Pulls, T., Peeters, R., and Wouters, K. (2013). Distributed
privacy-preserving transparency logging. In Sadeghi,
A.-R. and Foresti, S., editors, WPES, pages 83–94.
ACM.
Redfield, C. M. and Date, H. (2014). Gringotts: Secur-
ing data for digital evidence. In Security and Privacy
Workshops (SPW), 2014 IEEE, pages 10–17.
Ruebsamen, T. and Reich, C. (2013). Supporting cloud ac-
countability by collecting evidence using audit agents.
In Cloud Computing Technology and Science (Cloud-
Com), 2013 IEEE 5th International Conference on,
volume 1, pages 185–190.
Weitzner, D. J., Abelson, H., Berners-Lee, T., Feigenbaum,
J., Hendler, J., and Sussman, G. J. (2008). Information
accountability. Commun. ACM, 51(6):82–87.
Zhang, R., Li, Z., Yang, Y., and Li, Z. (2013). An efficient
massive evidence storage and retrieval scheme in en-
crypted database. In Information and Network Secu-
rity (ICINS 2013), 2013 International Conference on,
pages 1–6.
CLOSER2015-5thInternationalConferenceonCloudComputingandServicesScience
330