Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Yuki Ashino"'
Publikováno v:
PLoS ONE, Vol 18, Iss 12 (2023)
Externí odkaz:
https://doaj.org/article/b45d75df13b4442d93fa867acf5a896d
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 5, Iss 2, Pp 21-34 (2010)
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of
Externí odkaz:
https://doaj.org/article/fb1437cd8d5a4f56bdf9d2ae24533a64
Autor:
Yuki Ashino, Masayuki Nakae
Publikováno v:
AINA Workshops
Virtualization technologies are an important building block for cloud services. Each service will run on virtual machines (VMs) deployed over different hyper visors in the future. Therefore, a VM migration method between different hyper visor impleme
Publikováno v:
Advances in Digital Forensics V ISBN: 9783642041549
IFIP Int. Conf. Digital Forensics
IFIP Int. Conf. Digital Forensics
A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8621b1ea0400bc1898f57bd9f0ce84fd
https://doi.org/10.1007/978-3-642-04155-6_10
https://doi.org/10.1007/978-3-642-04155-6_10
Publikováno v:
IFIP — The International Federation for Information Processing ISBN: 9780387849263
IFIP Int. Conf. Digital Forensics
IFIP Int. Conf. Digital Forensics
This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f27bf2ff552fa2724de5c16622ebb117
https://doi.org/10.1007/978-0-387-84927-0_6
https://doi.org/10.1007/978-0-387-84927-0_6
Autor:
Ashino, Yuki1,2 (AUTHOR) d3841001@edu.kit.ac.jp, Ikuta, Yasushi3 (AUTHOR), Kida, Noriyuki2 (AUTHOR)
Publikováno v:
PLoS ONE. 12/14/2023, Vol. 18 Issue 12, p1-13. 13p.
Publikováno v:
2015 International Conference on Computing & Network Communications (CoCoNet); 1/1/2015, p452-456, 5p
Publikováno v:
2015 IEEE 39th Annual Computer Software & Applications Conference; 2015, pxxvii-xli, 15p
Publikováno v:
Advances in Information & Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings; 2015, pI-XIII, 13p
Publikováno v:
2012 26th International Conference on Advanced Information Networking & Applications Workshops; 1/ 1/2012, pv-xxvi, 22p