2010
DOI: 10.4028/www.scientific.net/amm.39.186
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Implementation of UFS File System Based on Computer Forensics

Abstract: UFS is the most important file system of the Unix OS and has been widely applied. Adequate understanding of its working principle and organization structure is the key that the computer forensics been successfully applied to this file system. Based on deep analysis of the system architecture and file access flow, this paper has proposed and realized a technology to analyse UFS file system and explored the data recovery thought. It provides forceful support for computer forensics technology applying to UFS .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…It can also add the digital signature of the message so that the recipient can confirm that the email sender is legal, and be sure that message has not been tampered. PGP can provide a safe means of communication, and did not need any secure channel to transmit the key [1]. It uses RSA and traditional encryption algorithm to validate hash algorithm and Zip compression algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…It can also add the digital signature of the message so that the recipient can confirm that the email sender is legal, and be sure that message has not been tampered. PGP can provide a safe means of communication, and did not need any secure channel to transmit the key [1]. It uses RSA and traditional encryption algorithm to validate hash algorithm and Zip compression algorithm.…”
Section: Introductionmentioning
confidence: 99%