A mechanism for securing digital evidences in pervasive environments

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In pervasive environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Jang, J. H., Park, M. C., Park, Y. S., Koh, B. S., & Choi, Y. R. (2007). A mechanism for securing digital evidences in pervasive environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4537 LNCS, pp. 602–611). Springer Verlag. https://doi.org/10.1007/978-3-540-72909-9_67

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free