Research on the Key Technology of Secure Computer Forensics

被引:3
|
作者
Zhang Yan [1 ]
Lin Ying [2 ]
机构
[1] Southwest Forestry Univ, Dept Comp Sci, Kunming, Yunnan Province, Peoples R China
[2] Yunnan Univ, Sch Software, Kunming, Yunnan Province, Peoples R China
关键词
computer forensics; digital evidence; integerity; secure evidence;
D O I
10.1109/IITSI.2010.134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer Forensics is a research hot topic in the field of computer security with the recent increases in illegal accesses to computer system. According to the procedure of computer forensics, this paper presents the frame model of computer forensics, analyses the source of digital evidence. Because of digital feature, it is especially critical to how to secure the protection of digital evidence and make computer forensics have legal recognition of ability. From the computer evidence collection phase, transmission phase and the storage stage, this paper discusses the key technologies and approaches to ensure the security of digital evidence respectively. Through the guidance of the frame model and the security guarantee to each stage of computer forensics, the evidence would eventually be provided to the court.
引用
收藏
页码:649 / 652
页数:4
相关论文
共 50 条
  • [1] Tools and technology for computer forensics: Research and development in Hong Kong
    Hui, Lucas C. K.
    Chow, K. P.
    Yiu, S. M.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 11 - +
  • [2] Research and Review on Computer Forensics
    Guo Hong
    Jin Bo
    Huang Daoli
    [J]. CHINA COMMUNICATIONS, 2010, 7 (06) : 37 - 43
  • [3] Research on Key Technology of Animation Scene Based on Computer Technology
    Xin, Guo
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 699 - 702
  • [4] Exploratory Study on Computer Forensics Technology
    Hu, Dan
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 608 - 611
  • [5] Research on the Key Technology of Security Detection of Computer BIOS
    Liu, Wei
    Lin, Jun
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 2054 - 2058
  • [6] Research on Key Technology of Computer Security Monitoring System
    Hui, Jin
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 236 - 239
  • [7] The Research of the constructing Based on the Computer Forensics
    Zhao Qing-shan
    Wu Shao-bing
    Ma Xue-ming
    [J]. NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 254 - 257
  • [8] Research the Computer Forensics Based on Network
    Hu Jingfang
    Li Busheng
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2282 - 2285
  • [9] The Research on the Tactic of Computer Static Forensics
    Liu, Huaihui
    [J]. 2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 207 - 212
  • [10] Research on IPV6-based Computer Crime Evidence Dynamic Forensics Technology
    Liu, Ronghua
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 720 - 724