File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Protecting digital data privacy in Computer Forensic Examination

TitleProtecting digital data privacy in Computer Forensic Examination
Authors
KeywordsComputer Forensics
Data Privacy
Data Protection
Digital Investigation
Issue Date2011
Citation
The 6th International Workshop on Systematic Approaches to Digital Forensic Engineeringi in conjunction with IEEE Security and Privacy Symposium (IEEE/SADFE 2011), Oakland, CA., 26 May 2011. How to Cite?
AbstractPrivacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation. © 2011 IEEE.
DescriptionSession 1: Forensic Modeling and Framework: no. 3
Persistent Identifierhttp://hdl.handle.net/10722/139988
References

 

DC FieldValueLanguage
dc.contributor.authorLaw, FYWen_US
dc.contributor.authorChan, PFen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorChow, KPen_US
dc.contributor.authorKwan, MYKen_US
dc.contributor.authorTse, HKSen_US
dc.date.accessioned2011-09-23T06:04:27Z-
dc.date.available2011-09-23T06:04:27Z-
dc.date.issued2011en_US
dc.identifier.citationThe 6th International Workshop on Systematic Approaches to Digital Forensic Engineeringi in conjunction with IEEE Security and Privacy Symposium (IEEE/SADFE 2011), Oakland, CA., 26 May 2011.en_US
dc.identifier.urihttp://hdl.handle.net/10722/139988-
dc.descriptionSession 1: Forensic Modeling and Framework: no. 3-
dc.description.abstractPrivacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation. © 2011 IEEE.-
dc.languageengen_US
dc.relation.ispartofIEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011en_US
dc.subjectComputer Forensics-
dc.subjectData Privacy-
dc.subjectData Protection-
dc.subjectDigital Investigation-
dc.titleProtecting digital data privacy in Computer Forensic Examinationen_US
dc.typeConference_Paperen_US
dc.identifier.emailLaw, FYW: ywlaw@cs.hku.hken_US
dc.identifier.emailChan, PF: pfchan@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.emailChow, KP: chow@cs.hku.hk-
dc.identifier.emailKwan, MYK: ykkwan@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.authorityChow, KP=rp00111en_US
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/SADFE.2011.15-
dc.identifier.scopuseid_2-s2.0-84858719292-
dc.identifier.hkuros192250en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-84858719292&selection=ref&src=s&origin=recordpage-
dc.identifier.scopusauthoridLaw, FYW=55125170500-
dc.identifier.scopusauthoridChan, PPF=52563246100-
dc.identifier.scopusauthoridYiu, SM=7003282240-
dc.identifier.scopusauthoridChow, KP=7202180751-
dc.identifier.scopusauthoridKwan, MYK=19640239200-
dc.identifier.scopusauthoridTse, HKS=55125185100-
dc.identifier.scopusauthoridLai, PKY=19640260600-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats