Privacy-preserving computer forensics framework
Computer forensics and privacy preservation are conflicting fields in computer security. Computer forensics tools essentially image and analyze all the data found in a targeted investigation. In contrast, privacy preservation techniques are used to protect a data owner private identity, information,...
| Main Author: | Halboob, Waleed Abduljabbar |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/57138/ http://psasir.upm.edu.my/id/eprint/57138/1/FSKTM%202015%2020RR.pdf |
Similar Items
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010)
by: Armstrong, Colin, et al.
Published: (2010)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Synchrotron FTIR characterisation of automotive primer surfacer paint coatings for forensic purposes
by: Maric, Mark, et al.
Published: (2014)
by: Maric, Mark, et al.
Published: (2014)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Experiences of restrictiveness in forensic psychiatric care: systematic review and concept analysis
by: Tomlin, Jack, et al.
Published: (2018)
by: Tomlin, Jack, et al.
Published: (2018)
Walking the beat on the path to technology - developing computer savvy police
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015)
by: Pichan, A., et al.
Published: (2015)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Preservation Yellow Alkaline Noodles Using Different Radiation Technologies
by: Soraya, Anissa
Published: (2011)
by: Soraya, Anissa
Published: (2011)
Data forensics analysis on biometric images using Benford's law and support vector machine algorithm
by: Hamid, Alsaadi Hussam Hussein
Published: (2024)
by: Hamid, Alsaadi Hussam Hussein
Published: (2024)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
My save food@ Bazaar programme saves 1,199.68kg of excess food items for less fortunate
by: The Borneo Post, Sarawak
Published: (2024)
by: The Borneo Post, Sarawak
Published: (2024)
A mixed methods examination of patient feedback within forensic and non-forensic mental healthcare services
by: Mottershead, Trixie
Published: (2018)
by: Mottershead, Trixie
Published: (2018)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Ageing in forensic psychiatric secure settings: the voice of older patients
by: Di Lorito, Claudio, et al.
Published: (2018)
by: Di Lorito, Claudio, et al.
Published: (2018)
Phytochemical profile, antimicrobial activity of nutmeg (Myristica fragrans Houtt.) seed extract and its efficacy as preservative for beef and shrimp
by: Lagha, Osama Mohamed Ben
Published: (2019)
by: Lagha, Osama Mohamed Ben
Published: (2019)
Chemical markers of decomposition for forensic science
by: Swann, Lisa
Published: (2011)
by: Swann, Lisa
Published: (2011)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Should we always look on the bright side of life?: the role of protective factors in forensic risk assessment and management
by: Jansen, Krista
Published: (2017)
by: Jansen, Krista
Published: (2017)
1,199.68kg lebihan makanan, minuman diselamat menerusi program MYSaveFood@Bazar Ramadan
by: Utusan Borneo, Sarawak
Published: (2024)
by: Utusan Borneo, Sarawak
Published: (2024)
Measuring experiences of restrictiveness in forensic psychiatric care: developing a questionnaire
by: Tomlin, Jack
Published: (2021)
by: Tomlin, Jack
Published: (2021)
Exploring the impact of ward climate and the development of a tool to measure staff culture in forensic community homes
by: Isgar, Rachel
Published: (2022)
by: Isgar, Rachel
Published: (2022)
Efficacy Of Selected Preservatives On Bamboo (Gigantochloa Scortechinii) Strips And Laminates
by: Alamjuri, Roziela Hanim
Published: (2008)
by: Alamjuri, Roziela Hanim
Published: (2008)
Literary Heritage or National Heritage? Landscape Preservation and Change in Dorset
by: Jones, Roy, et al.
Published: (2012)
by: Jones, Roy, et al.
Published: (2012)
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016)
by: Farjamfar, Anahita
Published: (2016)
An ethnography of creative practice in forensic mental health
by: Joyes, Emma
Published: (2019)
by: Joyes, Emma
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A review of biopolymer-based wood consolidants for archaeological wood preservation
by: Crosby, Jack
Published: (2023)
by: Crosby, Jack
Published: (2023)
A score based malware classification approach for mobile forensic analysis
by: Gobi, Ramyaa
Published: (2019)
by: Gobi, Ramyaa
Published: (2019)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Understanding countertransference reactions to forensic clients with a personality disorder diagnosis: an empirical study using the Countertransference Questionnaire
by: Wright, Laura
Published: (2017)
by: Wright, Laura
Published: (2017)
Forensic science in Seychelles: An example of a micro-jurisdiction forensic delivery system
by: Bouzin, Jemmy T, et al.
Published: (2021)
by: Bouzin, Jemmy T, et al.
Published: (2021)
Contextual sound preservation of selected local string instruments
by: Musib, Ahmad Faudzi
Published: (2015)
by: Musib, Ahmad Faudzi
Published: (2015)
Similar Items
-
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015) -
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015) -
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010) -
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014) -
Synchrotron FTIR characterisation of automotive primer surfacer paint coatings for forensic purposes
by: Maric, Mark, et al.
Published: (2014)