<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:42:14.739Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:3261" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:3261</identifier>
                <datestamp>2015-09-08T21:17:49Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Standard implementation in cloud forensics</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2015</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/3261</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://portal.synthesis.singidunum.ac.rs/paper/252</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:10756" confidence="-1">V. Dobrosavljević</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:10758" confidence="-1">I. Barać</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Everyday use of cloud services has exponentially increased primarily because of its popular price and because it is more convenient than the alternative physical computing services. Unfortunately, good marketing and lack of knowledge have lead many companies to enter the cloud without first performing a risk and security analysis. What happens when the cloud gets compromised is that you suffer a breach, and you find yourself in a position of having to conduct digital forensics and collect some data? What to do then? Is there an option to acquire data? Do you even know the location of your data? Can you tell if someone else has access to your data? Is the data located in the cloud service provider’s data center or they have a data storage service with the 3rd party? It is recommended to consider these issues before the actual incident has happened. But what can you actually do? This paper shows the standards that can be implemented in Cloud forensics and procedures and contracts that will facilitate analysis on a daily basis.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">139</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">142</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">http://dx.doi.org/10.15308/Synthesis-2015-139-142</dim:field>
                    <dim:field mdschema="dc" element="source">Зборник радова</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
