메뉴 건너뛰기




Volumn 4, Issue 4, 2005, Pages 263-276

Enabling shared audit data

Author keywords

Audit; Notarisation; Secure hardware; Timestamp

Indexed keywords


EID: 27644498532     PISSN: 16155262     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10207-004-0061-9     Document Type: Article
Times cited : (12)

References (22)
  • 1
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • 10.1007/BF00196791
    • Haber S, Stornetta WS (1991) How to time-stamp a digital document. J Cryptol 3:99-111 10.1007/BF00196791
    • (1991) J. Cryptol. , vol.3 , pp. 99-111
    • Haber, S.1    Stornetta, W.S.2
  • 2
    • 0242585280 scopus 로고
    • Improving the efficiency and reliability of digital time-stamping
    • Capocelli RM, De Santis A, Vaccaro U (eds) Springer, Berlin Heidelberg New York
    • Bayer D, Haber S, Stornetta WS (1993) Improving the efficiency and reliability of digital time-stamping. In: Capocelli RM, De Santis A, Vaccaro U (eds) Sequences II: Methods in communication, security, and computer science. Springer, Berlin Heidelberg New York, pp 329-334
    • (1993) Sequences II: Methods in Communication, Security, and Computer Science , pp. 329-334
    • Bayer, D.1    Haber, S.2    Stornetta, W.S.3
  • 5
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • Joye M (ed) Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Bellare M, Yee B (2003) Forward-security in private-key cryptography. In: Joye M (ed) Topics in Cryptology - CT-RSA 03. Lecture notes in computer science, vol 2612. Springer, Berlin Heidelberg New York
    • (2003) Topics in Cryptology - CT-RSA 03 , vol.2612
    • Bellare, M.1    Yee, B.2
  • 6
    • 0038223020 scopus 로고    scopus 로고
    • Forward integrity for audit logs
    • Technical report, UCSD tech report
    • Bellare M, Yee B (1997) Forward integrity for audit logs. Technical report, UCSD tech report
    • (1997)
    • Bellare, M.1    Yee, B.2
  • 8
    • 35048828815 scopus 로고    scopus 로고
    • Enhanced accountability for electronic processes
    • Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Baldwin A (2004) Enhanced accountability for electronic processes. In: 2nd international conference on trust management. Lecture notes in computer science, vol. Springer, Berlin Heidelberg New York
    • (2004) 2nd International Conference on Trust Management
    • Baldwin, A.1
  • 9
    • 84956984263 scopus 로고    scopus 로고
    • Time-stamping with binary linking schemes
    • Krawczyk H (ed) Santa Barbara, CA. Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Buldas A, Laud P, Lipmaa H, Villemson J (1998) Time-stamping with binary linking schemes. In: Krawczyk H (ed) Advances on Cryptology - CRYPTO '98, Santa Barbara, CA. Lecture notes in computer science, vol 1462. Springer, Berlin Heidelberg New York, pp 486-501
    • (1998) Advances on Cryptology - CRYPTO '98 , vol.1462 , pp. 486-501
    • Buldas, A.1    Laud, P.2    Lipmaa, H.3    Villemson, J.4
  • 10
    • 0003855464 scopus 로고    scopus 로고
    • 2nd edn: Protocols, algorithms and source code in C. Wiley, NewYork
    • Schneier B (1996) Applied cryptography, 2nd edn: Protocols, algorithms and source code in C. Wiley, NewYork
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 11
    • 0003900671 scopus 로고    scopus 로고
    • Rfc 3161 Internet x.509 public key infrastructure time stamp protocol (tsp)
    • Adams C, Cain P, Pinkas D, Zuccherato R (2001) Rfc 3161 Internet x.509 public key infrastructure time stamp protocol (tsp). http://www.ietf.org/rfc/rfc3161.txt
    • (2001)
    • Adams, C.1    Cain, P.2    Pinkas, D.3    Zuccherato, R.4
  • 13
    • 0142250276 scopus 로고    scopus 로고
    • Hardware encapsulation of security services
    • Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Baldwin A, Shiu S (2003) Hardware encapsulation of security services. In: Compter Security: Proceedings of ESORICS 2003. Lecture notes in computer science, vol 2808. Springer, Berlin Heidelberg New York
    • (2003) Compter Security: Proceedings of ESORICS 2003 , vol.2808
    • Baldwin, A.1    Shiu, S.2
  • 16
    • 35248883573 scopus 로고    scopus 로고
    • Hardware security appliances for trust
    • Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Baldwin A, Shiu S (2003) Hardware security appliances for trust. In: 1st international conference on trust management. Lecture notes in computer science, vol 2692. Springer, Berlin Heidelberg New York
    • (2003) 1st International Conference on Trust Management , vol.2692
    • Baldwin, A.1    Shiu, S.2
  • 17
    • 1242295745 scopus 로고    scopus 로고
    • Security requirements for cryptographic modules
    • FIPS fips 140-2
    • FIPS (2001) Security requirements for cryptographic modules. fips 140-2. http://csrc.nist.gov/cryptval/140-2.htm
    • (2001)
  • 18
    • 84958045366 scopus 로고    scopus 로고
    • Using a high performance programmable secure coprocessor
    • Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Smith SW, Palmer ER, Weingart S (1998) Using a high performance programmable secure coprocessor. In: 2nd international conference on financial cryptography. Lecture notes in computer science, vol. Springer, Berlin Heidelberg New York
    • (1998) 2nd International Conference on Financial Cryptography
    • Smith, S.W.1    Palmer, E.R.2    Weingart, S.3
  • 19
    • 85084164226 scopus 로고    scopus 로고
    • Secure coprocessor integration with kerberos V5
    • Itoi N (2000) Secure coprocessor integration with kerberos V5. In: Usenix security symposium, pp 113-128
    • (2000) Usenix Security Symposium , pp. 113-128
    • Itoi, N.1
  • 20
    • 0038684362 scopus 로고    scopus 로고
    • Practical private information retrieval with secure coprocessors
    • Technical report, IBM Research TJ Watson Research Center, Yorktown Heights, NY
    • Smith SW, Safford D (2000) Practical private information retrieval with secure coprocessors. Technical report, IBM Research TJ Watson Research Center, Yorktown Heights, NY. http://www.research.ibm.com/ secure_systems_department/projects/scop/papers/rc21806.pdf
    • (2000)
    • Smith, S.W.1    Safford, D.2
  • 21
    • 27144464694 scopus 로고    scopus 로고
    • A flexible role-based secure messaging service: Exploiting ibe technology for privacy in health care
    • IEEE Press, New York
    • Casassa Mont M, Bramhall P, Harrison K (2003) A flexible role-based secure messaging service: Exploiting ibe technology for privacy in health care. In: DEXA Workshops. IEEE Press, New York
    • (2003) DEXA Workshops
    • Casassa Mont, M.1    Bramhall, P.2    Harrison, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.