• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu. One Trusted Fix Method of Digital Data Forensics[J]. Journal of Beijing University of Technology, 2010, 36(5): 621-626. DOI: 10.3969/j.issn.0254-0037.2010.05.010
Citation: SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu. One Trusted Fix Method of Digital Data Forensics[J]. Journal of Beijing University of Technology, 2010, 36(5): 621-626. DOI: 10.3969/j.issn.0254-0037.2010.05.010

One Trusted Fix Method of Digital Data Forensics

More Information
  • Received Date: December 09, 2009
  • Available Online: December 14, 2022
  • After an introduction of the traditional fix method of digital data,in view of trusted forensics,a framework and its corresponding trusted fix method which supports the digital data's static properties is provided.Using DSA digital signature,timestamp,and the third confirmer signature scheme,the specific trusted fix algorithm of digital data is studied.Via formalized analyzing,the constraint rules for the digital data's static properties have been defined to be trusted,which also supports to the trusted fix.At last,with introduced axioms,theorems and rules,the formalized analyzing of trusted forensics is validated by certain examples.
  • [1]
    麦永浩,孙国梓,许榕生,等.计算机取证与司法鉴定[M].北京:清华大学出版社,2009:1-9.
    [2]
    林清秀.电子数据可信取证的形式化方法研究[D].南京:南京邮电大学计算机学院,2009.LIN Qing-xiu.Research on the formalism of trusted forensics on digital data[D].Nanjing:College of Computer,NanjingUniversity of Posts&Telecommunications,2009.(in Chinese)
    [3]
    薛金蓉,张洪斌.可信时间戳的网络服务器取证技术研究[J].电子科技大学学报,2007,36(6):1404-1406.XUE Jin-rong,ZHANG Hong-bin.Technical research of reliable timestamp based network server forensics[J].Journal ofUniversity of Electronic Science and Technology of China,2007,36(6):1404-1406.(in Chinese)
    [4]
    BRADLEY S,GEORGE M,ANDREW C.A correlation method for establishing provenance of timestamps in digital evidence[J].Digital Investigation,2006,3(1):98-107.
    [5]
    王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593.WANG Shang-ping,WANG Yu-min,ZHANG Ya-ling.Aconfirmer signature scheme based on DSAand RSA[J].Journal ofSoftware,2003,14(3):588-593.(in Chinese)
    [6]
    陈少真,李大兴.基于DSA的适合大群体的有效群签名[J].计算机研究与发展,2004,41(2):282-286.CHEN Shao-zhen,LI Da-xing.An efficient group signature scheme for large group on DSA[J].Journal of ComputerResearch and Development,2004,41(2):282-286.(in Chinese)
    [7]
    BRUCE J,NIKKEL.A portable network forensic evidence collector[J].Digital Investigation,2006,3(3):127-135.
    [8]
    ZOU C,CHIGAN C X.On game theoretic DSA-driven MAC for cognitive radio networks[J].Computer Communications,2009,32(18):1944-1954.
    [9]
    綦朝晖,孙济洲,郭琳琳.一种基于计算机取证的信息一致性方案[J].计算机工程,2006,32(11):172-173,176.QI Zhao-hui,SUNJi-zhou,GUO Lin-lin.Message integrity scheme on computer forensics[J].Computer Engineering,2006,32(11):172-173,176.(in Chinese)
    [10]
    DITTRICH D.Basic steps in forensic analysis of Unix systems[EB/OL].(2001-12-09)[2009-02-06]http:∥staff.washington.edu/dittrich/misc/forensics/.

Catalog

    Article views (22) PDF downloads (10) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return