2003
DOI: 10.1109/msecp.2003.1176992
|View full text |Cite
|
Sign up to set email alerts
|

Remembrance of data passed: a study of disk sanitization practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
97
1
5

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 160 publications
(103 citation statements)
references
References 2 publications
0
97
1
5
Order By: Relevance
“…If this occurs, then it may be classified as live forensics. Digital evidence that may be lost, such as data stored on volatile memory modules [43], must also be included.• Examination is the phase during which the evidence is made visible. The origin and significance of the evidence is determined.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…If this occurs, then it may be classified as live forensics. Digital evidence that may be lost, such as data stored on volatile memory modules [43], must also be included.• Examination is the phase during which the evidence is made visible. The origin and significance of the evidence is determined.…”
mentioning
confidence: 99%
“…If this occurs, then it may be classified as live forensics. Digital evidence that may be lost, such as data stored on volatile memory modules [43], must also be included.…”
mentioning
confidence: 99%
“…Encryption, as an element of cryptography, is a methodology for achieving information security, through secretive communications [14].…”
Section: A Data Encryption For Information Securitymentioning
confidence: 99%
“…These may range from simply copying the user-accessible files within the file system, to recovery of overwritten or deleted data, to the assemblage of metadata and use of statistical methods to determine access profiles and identify users associated with particular data items [15].…”
Section: Disk Images As Digital Objectsmentioning
confidence: 99%
“…More frequently, it is necessary to provide only portions of the image. A variety of approaches both for creating views into the raw data and extracting relevant selections of files and information to be stored for future use have been discussed in the forensics literature [15]. In other approaches, selective access to partial contents of a disk image are generated as needed using a pre-computed index, minimizing storage overhead while supporting high-performance access and retrieval [33][34].…”
Section: Dissemination Approachesmentioning
confidence: 99%