Conference on Digital Forensics and Cyber Crime,
pp.237–244.
Mell, P. & Grance, T., 2011. The NIST definition of cloud
computing. National Institute of Standards and
Technology, 53(6).
NIST Cloud Computing Forensic Science Working Group.
(Draft NISTIR 8006), 2014. NIST Cloud Computing
Forensic Science Challenges.
Pangalos, G., Ilioudis, C. & Pagkalos, I., 2010. The
importance of Corporate Forensic Readiness in the
information security framework. Enabling
Technologies: Infrastructures for Collaborative
Enterprises (WETICE), 2010 19th IEEE International
Workshop on. IEEE, pp.12–16.
Pangalos, G. & Katos, V., 2010. Information Assurance and
Forensic Readiness. In International Conference on e-
Democracy. Berlin: Springer, pp. 181–188.
Pearson, S., 2013. Privacy, security and trust in cloud
computing. In Privacy and Security for Cloud
Computing (pp. 3-42). Springer London.
Pichan, A., Lazarescu, M. & Soh, S.T., 2015. Cloud
forensics: Technical challenges, solutions and
comparative analysis. Digital Investigation, 13, pp.38–
57.
Rowlingson, R., 2004. A Ten Step Process for Forensic
Readiness. International Journal of Digital Evidence,
2(3), pp.1–28.
Reilly, D., Wren, C. & Berry, T., 2010. Cloud computing:
Forensic challenges for law enforcement. Internet
Technology and Secured Transactions (ICITST), 2010
International Conference for, pp.1–7.
Ruan, K., Carthy, J., Kechadi, T. and Crosbie, M., 2011.
Cloud forensics. Advances in Digital Forensics VII,
IFIP Advances in Information and Communication
Technology, 361, pp.35–46.
Ruan, K., Carthy, J. and Kechadi, T., 2011. Survey on
Cloud Forensics and Critical Criteria for Cloud
Forensic Capability: A Preliminary Analysis. ADFSL
Conference on Digital Forensics, Security and Law,
pp.55–70.
Ruan, K., James, J., Carthy, J. and Kechadi, T., 2012. Key
Terms for Service Level Agreements to Support Cloud
Forensics. IFIP International Conference on Digital
Forensics, pp.201–212.
Ruan, K., Carthy, J., Kechadi, T. and Baggili, I., 2013.
Cloud forensics definitions and critical criteria for
cloud forensic capability: An overview of survey
results. Digital Investigation, 10(1), pp.34–43.
Ruan, K. & Carthy, J., 2013. Cloud Forensic Maturity
Model. Digital Forensics and Cyber Crime, pp.22–41.
Sen, J., 2013. Security and Privacy Issues in Cloud
Computing. Architectures and Protocols for Secure
Information Technology, (iv), p.42.
Subashini, S. & Kavitha, V., 2011. A survey on security
issues in service delivery models of cloud computing.
Journal of Network and Computer Applications, 34(1),
pp.1–11.
Tan, J., 2001. Forensic Readiness. In Cambridge: MA:@
Stake, pp. 1–21.
Taylor, M., Haggerty, J., Gresty, D. and Hegarty, R., 2010.
Digital evidence in cloud computing systems.
Computer Law & Security Review, 26(3), pp.304–308.
Thorpe, S., Grandison, T., Campbell, A., Williams, J.,
Burrell, K. and Ray, I., 2013. Towards a forensic-based
service oriented architecture framework for auditing of
cloud logs. 2013 IEEE Ninth World Congress on
Services, pp.75–83.
Vaquero, L.M., Rodero-Merino, L., Caceres, J. and
Lindner, M., 2009. A Break in the Clouds: Towards a
Cloud Definition. ACM SIGCOMM Computer
Communication Review, 39(1), pp.50–55.
Weinhardt, C., Anandasivam, D.I.W.A., Blau, B., Borissov,
D.I.N., Meinl, D.M.T., Michalk, D.I.W.W. and Stößer,
J., 2009. Cloud Computing - A Classification, Business
Models, and Research Directions. Business &
Information Systems Engineering, p.391.
Weiss, A., 2007. Computing in the Clouds. netWorker
Magazine - Cloud computing: PC functions move onto
the web, (Volume II, Issue 4), pp.16–25.
Wolthusen, S.D., 2009. Overcast: Forensic discovery in
cloud environments. In IMF 2009 - 5th International
Conference on IT Security Incident Management and IT
Forensics - Conference Proceedings. pp. 3–9.
Yahya, F. et al., 2014. Security Challenges in Cloud
Storage. 2014 IEEE 6th International Conference on
Cloud Computing Technology and Science.
Zawoad, S. & Hasan, R., 2013. Digital Forensics in the
Cloud. CrossTalk, (October), pp.17–20.
Zawoad, S. and Hasan, R., 2013. Cloud forensics: a meta-
study of challenges, approaches, and open
problems. arXiv preprint arXiv:1302.6312.
Zhang, Q., Cheng, L. & Boutaba, R., 2010. Cloud
computing: State-of-the-art and research challenges.
Journal of Internet Services and Applications, 1(1),
pp.7–18.
Zissis, D. & Lekkas, D., 2012. Addressing cloud computing
security issues. Future Generation Computer Systems,
28(3), pp.583–592.