File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/SADFE.2011.15
- Scopus: eid_2-s2.0-84858719292
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Protecting digital data privacy in Computer Forensic Examination
Title | Protecting digital data privacy in Computer Forensic Examination |
---|---|
Authors | |
Keywords | Computer Forensics Data Privacy Data Protection Digital Investigation |
Issue Date | 2011 |
Citation | The 6th International Workshop on Systematic Approaches to Digital Forensic Engineeringi in conjunction with IEEE Security and Privacy Symposium (IEEE/SADFE 2011), Oakland, CA., 26 May 2011. How to Cite? |
Abstract | Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation. © 2011 IEEE. |
Description | Session 1: Forensic Modeling and Framework: no. 3 |
Persistent Identifier | http://hdl.handle.net/10722/139988 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Law, FYW | en_US |
dc.contributor.author | Chan, PF | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.contributor.author | Kwan, MYK | en_US |
dc.contributor.author | Tse, HKS | en_US |
dc.date.accessioned | 2011-09-23T06:04:27Z | - |
dc.date.available | 2011-09-23T06:04:27Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | The 6th International Workshop on Systematic Approaches to Digital Forensic Engineeringi in conjunction with IEEE Security and Privacy Symposium (IEEE/SADFE 2011), Oakland, CA., 26 May 2011. | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/139988 | - |
dc.description | Session 1: Forensic Modeling and Framework: no. 3 | - |
dc.description.abstract | Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation. © 2011 IEEE. | - |
dc.language | eng | en_US |
dc.relation.ispartof | IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011 | en_US |
dc.subject | Computer Forensics | - |
dc.subject | Data Privacy | - |
dc.subject | Data Protection | - |
dc.subject | Digital Investigation | - |
dc.title | Protecting digital data privacy in Computer Forensic Examination | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Law, FYW: ywlaw@cs.hku.hk | en_US |
dc.identifier.email | Chan, PF: pfchan@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.email | Chow, KP: chow@cs.hku.hk | - |
dc.identifier.email | Kwan, MYK: ykkwan@cs.hku.hk | - |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/SADFE.2011.15 | - |
dc.identifier.scopus | eid_2-s2.0-84858719292 | - |
dc.identifier.hkuros | 192250 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-84858719292&selection=ref&src=s&origin=recordpage | - |
dc.identifier.scopusauthorid | Law, FYW=55125170500 | - |
dc.identifier.scopusauthorid | Chan, PPF=52563246100 | - |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | - |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | - |
dc.identifier.scopusauthorid | Kwan, MYK=19640239200 | - |
dc.identifier.scopusauthorid | Tse, HKS=55125185100 | - |
dc.identifier.scopusauthorid | Lai, PKY=19640260600 | - |