2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering 2010
DOI: 10.1109/sadfe.2010.31
|View full text |Cite
|
Sign up to set email alerts
|

Security Digital Evidence

Abstract: Abstract-Non-repudiation of digital evidence is required by various use cases in today's business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event.To allow for non-repudiation of such an evidence record it is required to provide evidence on the used device itself, its configuration, and the software running at the time of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 13 publications
0
12
0
1
Order By: Relevance
“…Legally each country has its provisions regarding the type, character, and procedure of digital evidence to be accepted at the trial of law [2]. However, in general, digital evidence can be accepted in court if it fulfills some characteristics, namely, admissible, authentic, complete, reliable, and believable [5]. Through these criteria it can be maintained the integrity of the digital evidence that will be used, the clear linkages with the case being investigated, the completeness of the evidence collected also can be trusted.…”
Section: Digital Evidencementioning
confidence: 99%
“…Legally each country has its provisions regarding the type, character, and procedure of digital evidence to be accepted at the trial of law [2]. However, in general, digital evidence can be accepted in court if it fulfills some characteristics, namely, admissible, authentic, complete, reliable, and believable [5]. Through these criteria it can be maintained the integrity of the digital evidence that will be used, the clear linkages with the case being investigated, the completeness of the evidence collected also can be trusted.…”
Section: Digital Evidencementioning
confidence: 99%
“…Meanwhile, for the infrastructure of chain of custody, [11], [45], [46] have offered a solution for the secure infrastructure for digital evidence handling, that is, by establishing the concept of valid evidence based on a hardware-based security using a TPM (trusted platform module).…”
Section: Infrastructure Securitymentioning
confidence: 99%
“…All evidence must meet certain legal requirements before being presented in court. Braid as cited in [22] has defined five rules of evidence in order for evidence to be considered useful. Evidence must be admissible, authentic, complete, reliable and believable.…”
Section: Digital Forensics Challengesmentioning
confidence: 99%