1. Amazon, Amazon Web Services: Overview of Security Processes, Seattle, Washington (
aws.amazon.com/articles/1697
), 2008.
2. Association of Chief Police Officers, Good Practice Guide for Computer-Based Electronic Evidence, London, United Kingdom (
www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf
), 2008.
3. N. Beebe, Digital forensic research: The good, the bad and the unaddressed, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 17–36, 2009.
4. B. Gammage, D. Plummer, R. Valdes, K. McGee, K. Potter, S. Tan, D. Aron, R. Hunter, J. Heiser, B. Prentice, G. Alvarez, M. Basso, L. Fiering and K. Dulaney, Gartner’s Top Predictions for IT Organizations and Users, 2011 and Beyond: IT’s Growing Transparency, Document ID Number G00208367, Gartner, Stamford, Connecticut, 2010.
5. P. Mell and T. Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.