Information Technology Reference
In-Depth Information
[4] Barringer, H., Groce, A., Havelund, K., Smith, M.H.: Formal Analysis of Log
Files. Aerospace Computing, Information, and Communication (to appear, 2010)
[5] Behm, P., Benoit, P., Faivre, A., Meynadier, J.-M.: Météor: A Successful Appli-
cation of B in a Large Project. In: Woodcock, J.C.P., Davies, J. (eds.) FM 1999.
LNCS, vol. 1708, pp. 369-387. Springer, Heidelberg (1999)
[6] Buskirk, E.V., Liu, V.T.: Digital Evidence: Challenging the Presumption of Reli-
ability. Journal of Digital Forensic Practice 1(1), 19-26 (2006)
[7] Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I., Lenzini,
G.: Audit-based Compliance Control. International Journal of Information Secu-
rity 6(2-3), 133-151 (2007)
[8] Farrell, A.D.H., Sergot, M.J., Sallé, M., Bartolini, C.: Using the Event Calculus for
Tracking the Normative State of Contracts. International Journal of Cooperative
Information Systems (IJCIS) 14(2-3), 99-129 (2005)
[9] Fenech, S., Pace, G.J., Schneider, G.: CLAN: A tool for contract analysis and
conflict discovery. In: Liu, Z., Ravn, A.P. (eds.) ATVA 2009. LNCS, vol. 5799, pp.
90-96. Springer, Heidelberg (2009)
[10] Grossi, D., Royakkers, L.M.M., Dignum, F.: Organizational Structure and Re-
sponsibility. Artificial Intelligence and Law 15(3), 223-249 (2007)
[11] Hallal, H., Boroday, S., Petrenko, A., Ulrich, A.: A Formal Approach to Property
Testing in Causally Consistent Distributed Traces. Formal Aspects of Comput-
ing 18(1), 63-83 (2006)
[12] Insa, F.: The Admissibility of Electronic Evidence in Court (AEEC): Fighting
against High-Tech Crime - Results of a European Study. Journal of Digital Foren-
sic Practice 1(4), 285-289 (2006)
[13] Kyas, M., Prisacariu, C., Schneider, G.: Run-Time Monitoring of Electronic Con-
tracts. In: Cha, S(S.), Choi, J.-Y., Kim, M., Lee, I., Viswanathan, M. (eds.) ATVA
2008. LNCS, vol. 5311, pp. 397-407. Springer, Heidelberg (2008)
[14] Lamport, L.: Time, Clocks, and the Ordering of Events in a Distributed System.
Communications of the ACM 21(7), 558-565 (1978)
[15] Le Métayer, D., Maarek, M., Mazza, E., Potet, M.L., Viet Triem Tong, V., Crai-
peau, N., Frénot, S., Hardouin, R.: Liability in Software Engineering: Overview of
the LISE Approach and Illustration on a Case Study. In: International Conference
on Software Engineering (ICSE), pp. 135-144 (2010)
[16] Le Métayer, D., Mazza, E., Potet, M.L.: Designing Log Architecture For Legal
Evidence. In: Software Engineering And Formal Methods (SEFM). IEEE, Los
Alamitos (2010)
[17] Lima, T.D., Royakkers, L.M.M., Dignum, F.: A Logic For Reasoning About Re-
sponsibility. Logic Journal of the IGPL 18(1), 99-117 (2010)
[18] Maurer, U.M.: New Approaches to Digital Evidence. Proceedings of the
IEEE 92(6), 933-947 (2004)
[19] Peisert, S., Bishop, M., Karin, S., Marzullo, K.: Toward Models for Forensic Anal-
ysis. In: Systematic Approaches to Digital Forensic Engineering, pp. 3-15. IEEE,
Los Alamitos (2007)
[20] Rekhis, S., Krichène, J., Boudriga, N.: Cognitive-Maps Based Investigation of Dig-
ital Security Incidents. In: Systematic Approaches to Digital Forensic Engineering,
pp. 25-40 (2008)
[21] Saleh, M., Arasteh, A.R., Sakha, A., Debbabi, M.: Forensic Analysis of Logs:
Modeling and verification. Knowledge-Based Systems 20(7), 671-682 (2007)
[22] Sandler, D., Derr, K., Crosby, S.A., Wallach, D.S.: Finding the Evidence in
Tamper-Evident Logs. In: Systematic Approaches to Digital Forensic Engineering,
pp. 69-75 (2008)
Search WWH ::




Custom Search