期刊文献+

基于瀑布模型的可信取证方法 被引量:2

The methods of trusted forensic based on waterfall model
下载PDF
导出
摘要 给出"人+工具+证明"的取证模式,提出可信取证理念。从电子数据的静态属性可信性和取证方法动态行为的可信性两个方面对可信取证体系进行研究,以便最终形成可信的电子证据结果。建立基于瀑布模型的电子取证模型,从可信表达、可信分析、可信提取、可信固定以及可信发现等方面加以分析。 After giving the forensic model of "man + tools + confirmation", trusted forensic (TF) is proposed. From the trusted static attributes of digital data and trusted dynamic behavior of forensic method, the TF's goal is to get the trusted result. According to the strict process of computer forensics, the computer forensics model is been built based on the waterfall model. Finally, the model is analyzed from five aspects, such as trusted expressing, trusted analyzing, trusted extracting, trusted fixing, and trusted discovering.
出处 《信息网络安全》 2009年第7期4-6,20,共4页 Netinfo Security
基金 国家科技攻关项目(2007BAK34B06) 国家自然科学基金(60703086) 南京邮电大学攀登计划项目(NY208009)
关键词 信息安全 可信取证 瀑布模型 有效性 取证模型 Information security Trusted forensics Waterfall model Reliability Forensic model
  • 相关文献

参考文献2

二级参考文献7

  • 1IATF Document 3. 1. http://www. iatf. net/framework_docs/version-3_1/ index. cfm, 2003-03-20.
  • 2COHEN F. A note on the role of deception in information protection [EB/OL]. http ://all. net/journal/deception/deception. html. 2001-12-29.
  • 3COHEN F. A framework for deception [EB/OL].http://all. net/journal/deception/Framework/Framework. html. 2001-12-29.
  • 4COHEN F. A mathematical structure of simple defensive network deceptions [EB/OL]. http : //all. net /journal/deception/mathdeception/mathdeception.html. 2001-12-29.
  • 5Liang Yi wen, Li Huan, Kang Li shan, Dong Hong bin College of Computer Science, Wuhan University, Wuhan 430072, China.A Multi-Agent Immunology Model for Security Computer[J].Wuhan University Journal of Natural Sciences,2001,6(Z1):486-490. 被引量:5
  • 6马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 7王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198

共引文献23

同被引文献23

  • 1戴江山,肖军模,张增军.分布式网络实时取证系统研究与设计[J].电子科技大学学报,2005,34(3):347-350. 被引量:5
  • 2梁昌宇,吴强,曾庆凯.分布式计算机动态取证模型[J].计算机应用,2005,25(6):1290-1293. 被引量:3
  • 3李炳龙,王清贤,罗军勇,刘镔.可信计算环境中的数字取证[J].武汉大学学报(理学版),2006,52(5):523-526. 被引量:9
  • 4Aalst W M P. The application of Petri nets to workflow management. The Journal of Circuits, Systems and Comput- ers, 1998, 8(1): 21-66.
  • 5Eoghan Casey. Error, uncertainty, and loss in digital evi dence. International Journal of Digital Evidence, 2002, 1(2) : 1-45.
  • 6Daphyne S T, Karen A F. Legal methods of using computer forensics techniques for computer crime analysis and investigation. Issues in Information System, 2004, 4(2): 692-698.
  • 7Liao N D, Tian S F, Wang T H. Network forensics based on fuzzy logic and expert system. Computer Communications9 2009, 32(17): 1881-1892.
  • 8Alink W, Bhoedjang R A F, Boncz P A et al. XlRAF- XML-based indexing and querying :for digital forensics. Digital Investigation, 2006, 3(S1): 50-58.
  • 9Richard A, Michael T, John B. Use of data mining techniques to model crime scene investigator performance. Knowledge-Based Systems, 2007, 20(2) : 170-176.
  • 10Florian B, Eugene S. On the role of file system metadata in digital forensics. Digital Investigation, 2004, 1(4) :298-309.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部