Yianna Danidou and Burkhard Schafer TRUSTED COMPUTING AND THE DIGITAL CRIME SCENE

نویسنده

  • Burkhard Schafer
چکیده

1. The house of a suspect in a murder inquiry is searched. In a locked room, and a locked chest within that room, a bloodied knife is found that has the DNA of a murder victim on its blade. The room and the chest were securely locked, the owner of the house being the only one with a key that he never left out of his sight. There is no sign that either lock was tampered with, or that anyone other than the owner has ever been in the room.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security

This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities...

متن کامل

Securing Embedded Smart Cameras with Trusted Computing

Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analog towards digital systems, the capabilities of cameras are constantly increasing. Today’s smart camera systems come with considerable computing power, large memory, and wired or wireless c...

متن کامل

A Review on Data Generation for Digital Forensic Investigation using Data Mining

Digital forensic is part of forensic science that unconditionally covers cyber crimes. In a cyber crime digital forensic evidence examination requires a special process and techniques in examination of cyber crime in crime scene and examination of evidence are accepted in law enforcement. Cyber crime involves log data, transactional data is occurs which tends to plenty of data for storage and a...

متن کامل

SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases

Cyber activity has become an essential part of the general public’s everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. To further confirm the final finding of Cyber-crime, this study proposes three analytical tools to clarify the Cyber-crime issues by means of Ideal Log, M-N model and MDFA (Multi-faceted Digital...

متن کامل

Extracting relational facts for indexing and retrieval of crime-scene photographs

This paper presents work on text-based photograph indexing and retrieval for crime investigation, an application domain where efficient querying of large crime-scene photograph databases is of crucial importance. Automating this task will change current police practices considerably, by bringing ‘intelligence’ to crime support information systems. The prototype presented, goes beyond common app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011