Standard operating procedure and privilege management in Taiwan digital forensics

被引:0
作者
Lin, Yu-Li [1 ,3 ]
Wu, Tzong-Chen [1 ]
Su, Chien-Lung [2 ]
Chou, Yen-Chun [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Taipei, Taiwan
[2] Chang Gung Univ, Taoyuan, Taiwan
[3] Minist Justice Invest Bur (MJIB), Taipei, Taiwan
来源
PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2 | 2007年
关键词
computer forensics; digital forensics; digital evidence; evidence preservation; access control; fingerprinting;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, a new class of crime scenes has become more prevalent In a variety of criminal activities technologies are used to maintain records, communication, and commit crimes. For this reason, the challenge to investigative professionals is how to retrieve the digital evidence from storage devices and how to take the suspect to court. Digital evidence is different from physical. When the investigative professionals face the cases of computer crime, they must handle digital evidences properly to guarantee integrity and non-repudiation. This paper discusses a standard operating procedure to conduct inquires by the Ministry of Justice, Investigation Bureau (MJIB) in Taiwan, to achieve above goals. To enhance the quality and security of managing digital evidence, we also consider access control and fingerprint mechanisms to protect digital evidence from being misused, disclosed, or modified by malicious users. The results of this paper can be used to improve digital forensics in Taiwan.
引用
收藏
页码:154 / +
页数:3
相关论文
共 21 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
Casey E., 2002, Handbook of computer crime investigation forensic tools and technology
[3]  
Casey Eoghan., 2004, DIGITAL EVIDENCE COM, V2nd
[4]   CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME FOR ACCESS-CONTROL IN A HIERARCHY [J].
CHANG, CC ;
HWANG, RJ ;
WU, TC .
INFORMATION SYSTEMS, 1992, 17 (03) :243-247
[5]  
CHIEN HY, 2004, IEEE T KNOWL DATA EN, V16, P1301
[6]  
DENIZ S, 2002, IEEE COMPUTER FRAUD
[7]  
KUCHTA KJ, 2002, INFORM SYSTEM SECURI, V3, P29
[8]  
KUCHTA KJ, 2002, INFORM SYSTEMS SECUR, V9, P29
[9]   Cryptographic key assignment scheme for dynamic access control in a user hierarchy [J].
Kuo, FH ;
Shen, VRL ;
Chen, TS ;
Lai, F .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05) :235-240
[10]  
LIN IL, 2006, STUDY STANDARD OPERA