4Above the clouds:a Berkeley view of cloud computing[EB/OL].w.rw.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html,2011-09-10.
5Peter Mell,Tim Grance.Draft nist working definition of cloud computing[EB/OL].www.csrc.nist.gov/groups/SNS/cloud-computing/index.html,2009-4-24/2011-09-10.
6Mark Pollitt.A History of Digital Forensics[C].Advances in Digital Forensics VI,2010:3-15.
7van Baar R,Ahnk W and van Ballegooij A.Forensic memory analysis:Files mapped in memory[J].Digital Investigation,vol.2008,(05):52-57.
8A.Schuster,The impact of Microsoft Windows pool allocation strategies on memory forensics[J].Digital Investigation,vol.2008,(05):58-64.
9Solomon J,et al,User data persistence in physical memory[J].Digital Investigation,vol.4(2):199-211,2007.
10Joyce R,et al.MEGA:A tool for Mac OS X operating system and application forensics[J].Digital Investigation,vol.2008,(05):83-90.