• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Bo and Sun Yufang. Research and Protection of the Digital Evidence Collecting System[J]. Journal of Computer Research and Development, 2005, 42(8): 1422-1426.
Citation: Sun Bo and Sun Yufang. Research and Protection of the Digital Evidence Collecting System[J]. Journal of Computer Research and Development, 2005, 42(8): 1422-1426.

Research and Protection of the Digital Evidence Collecting System

More Information
  • Published Date: August 14, 2005
  • Research regarding digital forensic technologies has become more active with the recent increases in illegal accesses to computer systems. Digital evidence is easy to modify and erase. In order to collect the evidence with integrity and fidelity, digital evidence collecting system which is set in the target system in advance is proposed to collect digital evidence for purpose. And the security of forensic mechanisms themselves is another serious problem. Based on the analysis of relative researches, secure area is proposed to protect forensic mechanisms from attacking.
  • Related Articles

    [1]Li Wei, Feng Wei, Qin Yu, Feng Dengguo. Scheme of Runtime Monitoring in Confidential Computing with Dynamic Integrity Measurement[J]. Journal of Computer Research and Development, 2024, 61(10): 2482-2500. DOI: 10.7544/issn1000-1239.202440480
    [2]Jia Qiaowen, Ma Haoyu, Li Yan, Wang Zheyu, Shi Wenchang. A Novel Integrity Measurement Architecture for Embedded Linux Systems[J]. Journal of Computer Research and Development, 2022, 59(10): 2362-2375. DOI: 10.7544/issn1000-1239.20220525
    [3]Zhao Xiaofei, Shi Zhongzhi, Liu Jianwei. Structural Integrity Checking Based on Logically Independent Fragment of Metadata[J]. Journal of Computer Research and Development, 2020, 57(9): 1961-1970. DOI: 10.7544/issn1000-1239.2020.20190493
    [4]Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan. A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183. DOI: 10.7544/issn1000-1239.2017.20150900
    [5]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [6]Yuan Chunyang, Xu Junfeng, Zhu Chunge. A Trusted Recovery Model for Assurance of Integrity Policy Validity[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372.
    [7]Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.
    [8]Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216.
    [9]Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng. Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J]. Journal of Computer Research and Development, 2011, 48(8): 1438-1446.
    [10]Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326.

Catalog

    Article views (700) PDF downloads (647) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return