Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Yuki Ashino"'
Publikováno v:
PLoS ONE, Vol 18, Iss 12 (2023)
Externí odkaz:
https://doaj.org/article/b45d75df13b4442d93fa867acf5a896d
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 5, Iss 2, Pp 21-34 (2010)
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of
Externí odkaz:
https://doaj.org/article/fb1437cd8d5a4f56bdf9d2ae24533a64
Autor:
Yuki Ashino, Masayuki Nakae
Publikováno v:
AINA Workshops
Virtualization technologies are an important building block for cloud services. Each service will run on virtual machines (VMs) deployed over different hyper visors in the future. Therefore, a VM migration method between different hyper visor impleme
Publikováno v:
Advances in Digital Forensics V ISBN: 9783642041549
IFIP Int. Conf. Digital Forensics
IFIP Int. Conf. Digital Forensics
A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8621b1ea0400bc1898f57bd9f0ce84fd
https://doi.org/10.1007/978-3-642-04155-6_10
https://doi.org/10.1007/978-3-642-04155-6_10
Publikováno v:
IFIP — The International Federation for Information Processing ISBN: 9780387849263
IFIP Int. Conf. Digital Forensics
IFIP Int. Conf. Digital Forensics
This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f27bf2ff552fa2724de5c16622ebb117
https://doi.org/10.1007/978-0-387-84927-0_6
https://doi.org/10.1007/978-0-387-84927-0_6