A framework for designing cloud forensic-enabled services (CFeS)
Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-ba...
Ausführliche Beschreibung
Autor*in: |
Simou, Stavros [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2018 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer-Verlag London Ltd., part of Springer Nature 2018 |
---|
Übergeordnetes Werk: |
Enthalten in: Requirements engineering - Springer London, 1996, 24(2018), 3 vom: 13. März, Seite 403-430 |
---|---|
Übergeordnetes Werk: |
volume:24 ; year:2018 ; number:3 ; day:13 ; month:03 ; pages:403-430 |
Links: |
---|
DOI / URN: |
10.1007/s00766-018-0289-y |
---|
Katalog-ID: |
OLC2051498989 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2051498989 | ||
003 | DE-627 | ||
005 | 20230502150801.0 | ||
007 | tu | ||
008 | 200819s2018 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s00766-018-0289-y |2 doi | |
035 | |a (DE-627)OLC2051498989 | ||
035 | |a (DE-He213)s00766-018-0289-y-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
100 | 1 | |a Simou, Stavros |e verfasserin |0 (orcid)0000-0002-1038-0065 |4 aut | |
245 | 1 | 0 | |a A framework for designing cloud forensic-enabled services (CFeS) |
264 | 1 | |c 2018 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer-Verlag London Ltd., part of Springer Nature 2018 | ||
520 | |a Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. | ||
650 | 4 | |a Cloud forensics | |
650 | 4 | |a Cloud forensic methodology | |
650 | 4 | |a Cloud forensic process | |
650 | 4 | |a Cloud forensic conceptual model | |
650 | 4 | |a Cloud forensic constraints | |
700 | 1 | |a Kalloniatis, Christos |4 aut | |
700 | 1 | |a Gritzalis, Stefanos |4 aut | |
700 | 1 | |a Katos, Vasilios |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Requirements engineering |d Springer London, 1996 |g 24(2018), 3 vom: 13. März, Seite 403-430 |w (DE-627)218604068 |w (DE-600)1342870-6 |w (DE-576)05807032X |x 0947-3602 |7 nnns |
773 | 1 | 8 | |g volume:24 |g year:2018 |g number:3 |g day:13 |g month:03 |g pages:403-430 |
856 | 4 | 1 | |u https://doi.org/10.1007/s00766-018-0289-y |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 24 |j 2018 |e 3 |b 13 |c 03 |h 403-430 |
author_variant |
s s ss c k ck s g sg v k vk |
---|---|
matchkey_str |
article:09473602:2018----::faeokodsgiglufrniea |
hierarchy_sort_str |
2018 |
publishDate |
2018 |
allfields |
10.1007/s00766-018-0289-y doi (DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p DE-627 ger DE-627 rakwb eng 004 VZ Simou, Stavros verfasserin (orcid)0000-0002-1038-0065 aut A framework for designing cloud forensic-enabled services (CFeS) 2018 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag London Ltd., part of Springer Nature 2018 Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints Kalloniatis, Christos aut Gritzalis, Stefanos aut Katos, Vasilios aut Enthalten in Requirements engineering Springer London, 1996 24(2018), 3 vom: 13. März, Seite 403-430 (DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X 0947-3602 nnns volume:24 year:2018 number:3 day:13 month:03 pages:403-430 https://doi.org/10.1007/s00766-018-0289-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 24 2018 3 13 03 403-430 |
spelling |
10.1007/s00766-018-0289-y doi (DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p DE-627 ger DE-627 rakwb eng 004 VZ Simou, Stavros verfasserin (orcid)0000-0002-1038-0065 aut A framework for designing cloud forensic-enabled services (CFeS) 2018 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag London Ltd., part of Springer Nature 2018 Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints Kalloniatis, Christos aut Gritzalis, Stefanos aut Katos, Vasilios aut Enthalten in Requirements engineering Springer London, 1996 24(2018), 3 vom: 13. März, Seite 403-430 (DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X 0947-3602 nnns volume:24 year:2018 number:3 day:13 month:03 pages:403-430 https://doi.org/10.1007/s00766-018-0289-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 24 2018 3 13 03 403-430 |
allfields_unstemmed |
10.1007/s00766-018-0289-y doi (DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p DE-627 ger DE-627 rakwb eng 004 VZ Simou, Stavros verfasserin (orcid)0000-0002-1038-0065 aut A framework for designing cloud forensic-enabled services (CFeS) 2018 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag London Ltd., part of Springer Nature 2018 Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints Kalloniatis, Christos aut Gritzalis, Stefanos aut Katos, Vasilios aut Enthalten in Requirements engineering Springer London, 1996 24(2018), 3 vom: 13. März, Seite 403-430 (DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X 0947-3602 nnns volume:24 year:2018 number:3 day:13 month:03 pages:403-430 https://doi.org/10.1007/s00766-018-0289-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 24 2018 3 13 03 403-430 |
allfieldsGer |
10.1007/s00766-018-0289-y doi (DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p DE-627 ger DE-627 rakwb eng 004 VZ Simou, Stavros verfasserin (orcid)0000-0002-1038-0065 aut A framework for designing cloud forensic-enabled services (CFeS) 2018 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag London Ltd., part of Springer Nature 2018 Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints Kalloniatis, Christos aut Gritzalis, Stefanos aut Katos, Vasilios aut Enthalten in Requirements engineering Springer London, 1996 24(2018), 3 vom: 13. März, Seite 403-430 (DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X 0947-3602 nnns volume:24 year:2018 number:3 day:13 month:03 pages:403-430 https://doi.org/10.1007/s00766-018-0289-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 24 2018 3 13 03 403-430 |
allfieldsSound |
10.1007/s00766-018-0289-y doi (DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p DE-627 ger DE-627 rakwb eng 004 VZ Simou, Stavros verfasserin (orcid)0000-0002-1038-0065 aut A framework for designing cloud forensic-enabled services (CFeS) 2018 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag London Ltd., part of Springer Nature 2018 Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints Kalloniatis, Christos aut Gritzalis, Stefanos aut Katos, Vasilios aut Enthalten in Requirements engineering Springer London, 1996 24(2018), 3 vom: 13. März, Seite 403-430 (DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X 0947-3602 nnns volume:24 year:2018 number:3 day:13 month:03 pages:403-430 https://doi.org/10.1007/s00766-018-0289-y lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 AR 24 2018 3 13 03 403-430 |
language |
English |
source |
Enthalten in Requirements engineering 24(2018), 3 vom: 13. März, Seite 403-430 volume:24 year:2018 number:3 day:13 month:03 pages:403-430 |
sourceStr |
Enthalten in Requirements engineering 24(2018), 3 vom: 13. März, Seite 403-430 volume:24 year:2018 number:3 day:13 month:03 pages:403-430 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Requirements engineering |
authorswithroles_txt_mv |
Simou, Stavros @@aut@@ Kalloniatis, Christos @@aut@@ Gritzalis, Stefanos @@aut@@ Katos, Vasilios @@aut@@ |
publishDateDaySort_date |
2018-03-13T00:00:00Z |
hierarchy_top_id |
218604068 |
dewey-sort |
14 |
id |
OLC2051498989 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2051498989</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502150801.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2018 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00766-018-0289-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2051498989</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00766-018-0289-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Simou, Stavros</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-1038-0065</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A framework for designing cloud forensic-enabled services (CFeS)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag London Ltd., part of Springer Nature 2018</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic process</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic conceptual model</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic constraints</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gritzalis, Stefanos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katos, Vasilios</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Requirements engineering</subfield><subfield code="d">Springer London, 1996</subfield><subfield code="g">24(2018), 3 vom: 13. März, Seite 403-430</subfield><subfield code="w">(DE-627)218604068</subfield><subfield code="w">(DE-600)1342870-6</subfield><subfield code="w">(DE-576)05807032X</subfield><subfield code="x">0947-3602</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:24</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:3</subfield><subfield code="g">day:13</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:403-430</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00766-018-0289-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">24</subfield><subfield code="j">2018</subfield><subfield code="e">3</subfield><subfield code="b">13</subfield><subfield code="c">03</subfield><subfield code="h">403-430</subfield></datafield></record></collection>
|
author |
Simou, Stavros |
spellingShingle |
Simou, Stavros ddc 004 misc Cloud forensics misc Cloud forensic methodology misc Cloud forensic process misc Cloud forensic conceptual model misc Cloud forensic constraints A framework for designing cloud forensic-enabled services (CFeS) |
authorStr |
Simou, Stavros |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)218604068 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0947-3602 |
topic_title |
004 VZ A framework for designing cloud forensic-enabled services (CFeS) Cloud forensics Cloud forensic methodology Cloud forensic process Cloud forensic conceptual model Cloud forensic constraints |
topic |
ddc 004 misc Cloud forensics misc Cloud forensic methodology misc Cloud forensic process misc Cloud forensic conceptual model misc Cloud forensic constraints |
topic_unstemmed |
ddc 004 misc Cloud forensics misc Cloud forensic methodology misc Cloud forensic process misc Cloud forensic conceptual model misc Cloud forensic constraints |
topic_browse |
ddc 004 misc Cloud forensics misc Cloud forensic methodology misc Cloud forensic process misc Cloud forensic conceptual model misc Cloud forensic constraints |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Requirements engineering |
hierarchy_parent_id |
218604068 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Requirements engineering |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)218604068 (DE-600)1342870-6 (DE-576)05807032X |
title |
A framework for designing cloud forensic-enabled services (CFeS) |
ctrlnum |
(DE-627)OLC2051498989 (DE-He213)s00766-018-0289-y-p |
title_full |
A framework for designing cloud forensic-enabled services (CFeS) |
author_sort |
Simou, Stavros |
journal |
Requirements engineering |
journalStr |
Requirements engineering |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2018 |
contenttype_str_mv |
txt |
container_start_page |
403 |
author_browse |
Simou, Stavros Kalloniatis, Christos Gritzalis, Stefanos Katos, Vasilios |
container_volume |
24 |
class |
004 VZ |
format_se |
Aufsätze |
author-letter |
Simou, Stavros |
doi_str_mv |
10.1007/s00766-018-0289-y |
normlink |
(ORCID)0000-0002-1038-0065 |
normlink_prefix_str_mv |
(orcid)0000-0002-1038-0065 |
dewey-full |
004 |
title_sort |
a framework for designing cloud forensic-enabled services (cfes) |
title_auth |
A framework for designing cloud forensic-enabled services (CFeS) |
abstract |
Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. © Springer-Verlag London Ltd., part of Springer Nature 2018 |
abstractGer |
Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. © Springer-Verlag London Ltd., part of Springer Nature 2018 |
abstract_unstemmed |
Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks. © Springer-Verlag London Ltd., part of Springer Nature 2018 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 |
container_issue |
3 |
title_short |
A framework for designing cloud forensic-enabled services (CFeS) |
url |
https://doi.org/10.1007/s00766-018-0289-y |
remote_bool |
false |
author2 |
Kalloniatis, Christos Gritzalis, Stefanos Katos, Vasilios |
author2Str |
Kalloniatis, Christos Gritzalis, Stefanos Katos, Vasilios |
ppnlink |
218604068 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s00766-018-0289-y |
up_date |
2024-07-04T04:35:37.978Z |
_version_ |
1803621748413825024 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2051498989</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502150801.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2018 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00766-018-0289-y</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2051498989</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00766-018-0289-y-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Simou, Stavros</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-1038-0065</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A framework for designing cloud forensic-enabled services (CFeS)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag London Ltd., part of Springer Nature 2018</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services fall back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic enabled. It consists of a set of cloud forensic constraints, a modeling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic-related tasks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic process</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic conceptual model</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud forensic constraints</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gritzalis, Stefanos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katos, Vasilios</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Requirements engineering</subfield><subfield code="d">Springer London, 1996</subfield><subfield code="g">24(2018), 3 vom: 13. März, Seite 403-430</subfield><subfield code="w">(DE-627)218604068</subfield><subfield code="w">(DE-600)1342870-6</subfield><subfield code="w">(DE-576)05807032X</subfield><subfield code="x">0947-3602</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:24</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:3</subfield><subfield code="g">day:13</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:403-430</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00766-018-0289-y</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">24</subfield><subfield code="j">2018</subfield><subfield code="e">3</subfield><subfield code="b">13</subfield><subfield code="c">03</subfield><subfield code="h">403-430</subfield></datafield></record></collection>
|
score |
7.399063 |