期刊文献+

一种计算机取证中需求定义的方法

Research on a Definition Method of Digital Forensic Requirement
在线阅读 下载PDF
导出
摘要 如何描述和规范计算机取证需求是计算机取证基本理论及基本方法研究中较为突出的一个问题.本文结合软件工程及安全工程的思想提出了场景需求定义法,它对计算机取证需求的制定给出了一套定义方法.基于以上定义方法,需求的制定可以面向所有计算机取证环境,即它不限定哪类取证环境应该提供哪些取证需求,而是在实际应用中根据实际需要来确定,这为描述不断变化的复杂现实应用环境中的安全需求提供了灵活性. How to describe and standardize the digital forensic requirement is an important part in digital forensic methodology. The paper propose the definition method of digital forensic requirement and an abstract model, named Environment Request Description (ERD). ERD definite three methods to describe digital forensic environment and requirement:Components,Environment Profile and Environment Target. ERD don't depend on a special digital forensic environment. Customer, developer and others depending on active usage could decide requirement. It will be useful to definite a forensic requirement in different and complex digital forensic environment.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第5期921-923,共3页 Acta Electronica Sinica
基金 国家自然科学基金(No.60073022) 国家863高技术研究发展计划(No.306-ZD12-14-2) 中国科学院知识创新工程基金(No.KGCX1-09)
关键词 电子数据取证 有效性 真实性 digital forensics validity fidelity
  • 相关文献

参考文献9

  • 1Gary Palmer.A Road Map for Digital Forensics Research[R].Rome Research Site:Air Force Research Laboratory,2001.
  • 2US Department of Justice.Electronic Crime Scene Investigation:A Guide for First Responders[DB/OL].http://www.ncjrs.org/pdffiles1/nij/187736.pdf,2001.
  • 3Maher-Heather.Online and Out of Line:Why is Cybercrime on the Rise,and Who's Responsible[DB/OL].http://abcnews.go.com/sections/us/DailyNews/cybercrime 000117.html,2002.
  • 4Brian Carrier,Eugene Spafford.Getting physical with the digital forensics investigation[J].International Journal of Digital Evidence,2003,2(2):29-49.
  • 5Farmer D,Venema W.Computer Forensics Analysis Class Handouts[DB/OL].http://www.fish.com/forensics/class.html,1999.
  • 6Mandia K,Prosise C.Incident Response[M].Osborne:McGraw-Hill,2001.
  • 7孙波,孙玉芳,张相锋,梁彬.电子数据职证研究概述[J].计算机科学,2005,32(2):13-19. 被引量:13
  • 8孙波,孙玉芳,张相锋,梁彬.电子数据证据收集系统保护机制的研究与实现[J].电子学报,2004,32(8):1374-1380. 被引量:8
  • 9Noblett-M-G,Pollitt-M-M,Presley-L-A.Recovering and examining computer forensic evidence[J].Forensic Science Communications,2000,2(4):9-18.

二级参考文献49

  • 1孙波,孙玉芳,张相锋,梁彬.电子数据证据收集系统保护机制的研究与实现[J].电子学报,2004,32(8):1374-1380. 被引量:8
  • 2Adams D E,Lothridge K L. Scientific Working Groups. Forensic Science Communications, 2000,2 (3).?A
  • 3Carrier B,Spafford E. Getting physical with the digital forensics investigation. International Journal of Digital Evidence, Winter 2003.
  • 4Casey E. Digital Evidence and Computer Crime. Academic Press,2001.
  • 5Computer Forensics,et al. http: //www. computer-forensics. com.
  • 6Digital Forensics Research Workshop. A Road Map for Digital Forensics Research. www. dfrws. org,2001.
  • 7Farmer D,Venema W. Computer Forensics Analysis Class Handouts. http: // www. fish. com/forensics/class. html, 1999.
  • 8Fisch E A,White G B,et al. The Design of An Audit Trail Analysis Tool. IEEE, 1994.
  • 9Guidance Software. inc. http: //www. encase. com.
  • 10International Organization on Computer Evidence. Digital evidence. standards and principles. http: //www. fbi. gov,May 2003.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部