Research on the Key Technology of Secure Computer Forensics

被引:3
|
作者
Zhang Yan [1 ]
Lin Ying [2 ]
机构
[1] Southwest Forestry Univ, Dept Comp Sci, Kunming, Yunnan Province, Peoples R China
[2] Yunnan Univ, Sch Software, Kunming, Yunnan Province, Peoples R China
关键词
computer forensics; digital evidence; integerity; secure evidence;
D O I
10.1109/IITSI.2010.134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer Forensics is a research hot topic in the field of computer security with the recent increases in illegal accesses to computer system. According to the procedure of computer forensics, this paper presents the frame model of computer forensics, analyses the source of digital evidence. Because of digital feature, it is especially critical to how to secure the protection of digital evidence and make computer forensics have legal recognition of ability. From the computer evidence collection phase, transmission phase and the storage stage, this paper discusses the key technologies and approaches to ensure the security of digital evidence respectively. Through the guidance of the frame model and the security guarantee to each stage of computer forensics, the evidence would eventually be provided to the court.
引用
收藏
页码:649 / 652
页数:4
相关论文
共 50 条
  • [41] Research and implementation of key technologies of digital forensics based on cloud computing
    [J]. Fang, Wei, 1600, Universidad Central de Venezuela (55):
  • [42] The Application and Key Technology of Computer Technology in Graphic Image Processing
    Zhang, Yi
    Huang, Cheng
    Bo, Huang
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 543 - 546
  • [43] Key research on computer aided tolerancing
    Cao, Yan-long
    Mathieu, Luc
    Jiang, Jane
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2015, 16 (05): : 335 - 340
  • [44] The application of XML-based Data Exchanging Technology in The Computer Forensics Field
    Liu, Qin
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 395 - 400
  • [45] Research on Secure Key Techniques of Trustworthy Distributed System
    He, Ming
    Hu, Aiqun
    Qiu, Hangping
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 172 - +
  • [46] Research on E-Commerce Secure Technology
    Li Yuewen
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [47] Overlooked semiconductor technology plays a key role in secure IoT
    Mayor, Cedric
    [J]. SOLID STATE TECHNOLOGY, 2016, 59 (02) : 41 - 41
  • [48] Key Establishment for Secure Asymmetric Cross-Technology Communication
    Wang, Wei
    Liu, Xin
    Chi, Zicheng
    Ray, Stuart
    Zhu, Ting
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 412 - 422
  • [49] Research on Algorithm Based on Secure Computer Network Defense
    Tian Jifeng
    [J]. PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1462 - 1468
  • [50] Baccalaureate Programs in Computer Forensics
    Liu, Jigang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2016, : 615 - 620