{"id":"https://openalex.org/W2064936519","doi":"https://doi.org/10.1109/tifs.2013.2256784","title":"Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data","display_name":"Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data","publication_year":2013,"publication_date":"2013-04-04","ids":{"openalex":"https://openalex.org/W2064936519","doi":"https://doi.org/10.1109/tifs.2013.2256784","mag":"2064936519"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2256784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2256784","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008190964","display_name":"Zoe L. Jiang","orcid":"https://orcid.org/0000-0002-8944-7444"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Zoe L. Jiang","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China","Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013234988","display_name":"Junbin Fang","orcid":"https://orcid.org/0000-0002-0730-8732"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]},{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Junbin Fang","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China","Key Laboratory of Optoelectronic Information and Sensing Technologies of Guangdong Higher Education Institutes and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"Key Laboratory of Optoelectronic Information and Sensing Technologies of Guangdong Higher Education Institutes and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108356556","display_name":"Frank Law","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Frank Y. W. Law","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108472865","display_name":"Pierre Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Pierre K. Y. Lai","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067968762","display_name":"Ricci Ieong","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ricci S. C. Ieong","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102185339","display_name":"Michael Y. K. Kwan","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Michael Y. K. Kwan","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040488307","display_name":"K. P. Chow","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"K. P. Chow","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109853326","display_name":"Lucas C. K. Hui","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Lucas C. K. Hui","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110500992","display_name":"Siu\u2010Ming Yiu","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"S. M. Yiu","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110201541","display_name":"K.H. Pun","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"K. H. Pun","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5008190964"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18098595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":"5","first_page":"821","last_page":"828"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9574000239372253,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7909407615661621},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.7573349475860596},{"id":"https://openalex.org/keywords/legal-advice","display_name":"Legal advice","score":0.5391530990600586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5178778171539307},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.48273417353630066},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.46451181173324585},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.4308469295501709},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33290719985961914},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3096143901348114},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07471814751625061}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7909407615661621},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.7573349475860596},{"id":"https://openalex.org/C2993469667","wikidata":"https://www.wikidata.org/wiki/Q220117","display_name":"Legal advice","level":2,"score":0.5391530990600586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5178778171539307},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.48273417353630066},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.46451181173324585},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.4308469295501709},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33290719985961914},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3096143901348114},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07471814751625061}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2013.2256784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2256784","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:hub.hku.hk:10722/190317","is_oa":false,"landing_page_url":"http://hdl.handle.net/10722/190317","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W590383962","https://openalex.org/W1521685024","https://openalex.org/W1964600147","https://openalex.org/W1987311960","https://openalex.org/W2006275091","https://openalex.org/W2031533739","https://openalex.org/W2157491168"],"related_works":["https://openalex.org/W2374400535","https://openalex.org/W1512516340","https://openalex.org/W1563620594","https://openalex.org/W2292701555","https://openalex.org/W3124005216","https://openalex.org/W2011171183","https://openalex.org/W4245615893","https://openalex.org/W4256680382","https://openalex.org/W1991364826","https://openalex.org/W4239049758"],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,40,60,102,144],"legal":[3,22,47],"professional":[4],"privilege":[5],"(LPP)":[6],"in":[7,63],"the":[8,41,64,109,121,135,142],"Common":[9],"Law":[10],"is":[11,67,123],"to":[12,16,20,119,133],"enable":[13],"a":[14,46,85,99,103,127],"client":[15,51],"make":[17],"full":[18],"disclosure":[19],"his":[21,50],"advisor":[23,48],"for":[24,57,73,89],"seeking":[25],"advice":[26],"without":[27],"worrying":[28],"that":[29,130],"anything":[30],"so":[31],"disclosed":[32],"will":[33],"be":[34,53],"used":[35],"against":[36],"him.":[37],"Thus,":[38],"some":[39],"communications":[42],"and":[43,49,70],"documents":[44,76],"between":[45],"can":[52],"excluded":[54],"as":[55],"evidence":[56],"prosecution.":[58],"Protection":[59],"LPP":[61,75,92,110],"information":[62],"physical":[65],"world":[66],"well":[68],"addressed":[69],"proper":[71],"procedures":[72],"handling":[74],"have":[77],"been":[78],"established.":[79],"However,":[80],"there":[81],"does":[82],"not":[83],"exist":[84],"forensically":[86],"sound":[87],"procedure":[88],"protecting":[90],"digital":[91],"information.":[93],"In":[94],"this":[95],"correspondence,":[96],"motivated":[97],"by":[98],"real":[100,136],"case":[101,137],"commercial":[104],"crime":[105],"investigation,":[106],"we":[107,125],"introduce":[108],"data":[111],"integrity":[112],"problem.":[113],"While":[114],"finding":[115],"an":[116],"ideal":[117],"solution":[118,129,146],"solve":[120,134],"problem":[122],"difficult,":[124],"propose":[126],"practical":[128],"was":[131],"adopted":[132],"investigation.":[138],"We":[139],"also":[140],"analyze":[141],"performance":[143],"our":[145],"based":[147],"on":[148],"simulated":[149],"data.":[150]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
