2018
DOI: 10.17781/p002400
|View full text |Cite
|
Sign up to set email alerts
|

Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The authors in [23] encrypted the XML structure on the digital chain of custody data storage using the RC4 cryptography technique. One benefit of utilizing XML is that it is simple for non-professionals to comprehend.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [23] encrypted the XML structure on the digital chain of custody data storage using the RC4 cryptography technique. One benefit of utilizing XML is that it is simple for non-professionals to comprehend.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Digital evidence is complex, diffuse, volatile, and easy to change. There are many indications that may be used to identify problems with the management of CoC [10] [20][21][22][23]: (1) Threats to the data integrity of digital evidence throughout its lifetime. (2) A massive amount of data is produced by billions of linked devices and must be stored, presenting significant difficulties in ensuring authenticity.…”
Section: Introductionmentioning
confidence: 99%
“…Based on Ashcroft, Daniels, & Hart, (2004) in the National Institute of Justice report, the Chain of Custody form document contains a history or chronology of the journey of evidence containing complete information such as subjects / objects involved in collection and analysis activities, date / time and place collection and analysis, full names and nicknames of victims and perpetrators, agency names and full description of evidence. There are 4 things that must be considered in handling Chain of Custody (Widatama, et al, 2018), namely: Flexibility and capability in the chain of custody documentation, Interoperability between evidence obtained with the chain of custody, Security in the chain of custody documentation, Chain making of custody must be understood by everyone, especially when the case is brought to court.…”
Section: Institut Teknologi Bisnis Aas Indonesiamentioning
confidence: 99%