Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation
Computer forensics and privacy protection fields are two conflicting directions in computer security. In the other words, computer forensics tools try to discover and extract digital evidences related to a specific crime, while privacy protection techniques aim at protecting the data owner’s privacy...
| Main Authors: | Halboob, Waleed Abduljabbar Mohammed, Mahmod, Ramlan, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/43063/ http://psasir.upm.edu.my/id/eprint/43063/1/Privacy%20Levels%20for%20Computer%20Forensics%20Toward%20a%20More%20Efficient%20Privacy-preserving%20Investigation.pdf |
Similar Items
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Implementing Privacy-Preserving Record Linkage in a Cloud
Computing Environment
by: Brown, Adrian Paul
Published: (2021)
by: Brown, Adrian Paul
Published: (2021)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
Privacy preserving for electronic health record systems
by: Yussuf, Zakariye Mohamed
Published: (2019)
by: Yussuf, Zakariye Mohamed
Published: (2019)
A Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
by: Vidanage, Anushka, et al.
Published: (2020)
by: Vidanage, Anushka, et al.
Published: (2020)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Estimating parameters for probabilistic linkage of privacy-preserved datasets.
by: Brown, A., et al.
Published: (2017)
by: Brown, A., et al.
Published: (2017)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Enhancing privacy of paging procedure in LTE
by: Muthana, Abdulrahman, et al.
Published: (2018)
by: Muthana, Abdulrahman, et al.
Published: (2018)
Privacy preserving linkage using multiple dynamic match keys
by: Randall, Sean, et al.
Published: (2019)
by: Randall, Sean, et al.
Published: (2019)
Application of privacy-preserving techniques in operational record linkage centres
by: Boyd, James, et al.
Published: (2015)
by: Boyd, James, et al.
Published: (2015)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015)
by: Jin, Zhe
Published: (2015)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
An Efficient Framework Of Identity-based Conditional Privacy-preserving Authentication For Vehicular Ad Hoc Networks
by: Shareeda, Mahmood Arif Lafta Al
Published: (2022)
by: Shareeda, Mahmood Arif Lafta Al
Published: (2022)
Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage
by: Schnell, Rainer, et al.
Published: (2017)
by: Schnell, Rainer, et al.
Published: (2017)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008)
by: Dehghantanha, Ali
Published: (2008)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data
by: Stausberg, J., et al.
Published: (2017)
by: Stausberg, J., et al.
Published: (2017)
Similar Items
-
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015) -
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014) -
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017) -
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)