메뉴 건너뛰기




Volumn 3, Issue 2, 2006, Pages 120-131

A policy-driven, content-based security protocol for protecting audit logs on wireless devices

Author keywords

Audit logs; Customizable security; Policydriven security; Security

Indexed keywords

AUDIT LOGS; CRYPTOGRAPHIC PROTOCOLS; CUSTOMIZABLE; POLICY DRIVEN; SECURITY; SECURITY ARCHITECTURE; SECURITY PROTOCOLS; SECURITY STRENGTHS;

EID: 34250213398     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (13)
  • 1
    • 0038223020 scopus 로고    scopus 로고
    • Technical Report, Computer Science and Engineering Department, University of California at San Diego, Nov.
    • M. Bellare and B. Yee, Forward Integrity for Secure Audit Logs, Technical Report, Computer Science and Engineering Department, University of California at San Diego, Nov. 1997.
    • (1997) Forward Integrity for Secure Audit Logs
    • Bellare, M.1    Yee, B.2
  • 2
    • 0013017020 scopus 로고    scopus 로고
    • Rijndael, the advanced encryption standard
    • Mar
    • J. Daemen and V. Rijmen, " Rijndael, the advanced encryption standard," Dr. Dobb's Journal, vol. 26, no. 3, pp. 137-139, Mar. 2001.
    • (2001) Dr. Dobb's Journal , vol.26 , Issue.3 , pp. 137-139
    • Daemen, J.1    Rijmen, V.2
  • 6
    • 84874876015 scopus 로고    scopus 로고
    • Microsoft's .Net Compact Framework Home Page
    • Microsoft's .Net Compact Framework Home Page, http://msdn.microsoft.com/smartclient/netcf/default.aspx.
  • 7
    • 84874835098 scopus 로고    scopus 로고
    • Microsoft's Visual Studio 2005 Home Page
    • Microsoft's Visual Studio 2005 Home Page, http://msdn.microsoft.com/vs2005/default.aspx.
  • 8
    • 84874902663 scopus 로고
    • National Institute of Standards and Technology, Secure Hash Standard, Federal Information Processing Standards, Publication
    • National Institute of Standards and Technology, Secure Hash Standard, Federal Information Processing Standards, Publication 180-1, 1995.
    • (1995) , pp. 180-181
  • 10
    • 0031177289 scopus 로고    scopus 로고
    • Remote auditing of software outputs Using a Trusted Coprocessor
    • B. Schneier and J. Kelsey, " Remote auditing of software outputs Using a Trusted Coprocessor," Future Generation Computer Systems13, vol. 1, pp. 9-18, 1997.
    • (1997) Future Generation Computer Systems13 , vol.1 , pp. 9-18
    • Schneier, B.1    Kelsey, J.2
  • 13
    • 84985796228 scopus 로고
    • HAVAL-A one-way hashing algorithm with variable length of output
    • Y. Zheng, J. Pieprzyk, and J. Seberry, " HAVAL-A one-way hashing algorithm with variable length of output," in Auscrypto '92, LNCS 718, pp. 83-104, 1992.
    • (1992) Auscrypto '92, LNCS , vol.718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.