메뉴 건너뛰기




Volumn , Issue , 2008, Pages 27-36

Improving secure long-term archival of digitally signed documents

Author keywords

Digitally signed documents; Retimestamping; Secure long term archiving

Indexed keywords

ARCHIVAL SYSTEMS; COMPUTING TIME; DIGITAL SIGNATURE; DIGITALLY SIGNED DOCUMENTS; RETIMESTAMPING; SECURE LONG-TERM ARCHIVING; SECURITY PROPERTIES; STORAGE SPACES; STORAGE SYSTEMS;

EID: 67651053317     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456469.1456476     Document Type: Conference Paper
Times cited : (7)

References (44)
  • 2
    • 70349245972 scopus 로고    scopus 로고
    • R. Anderson. The eternity service. In J. P?ribyl, editor, Proceedings of Pragocrypt '96, pages 242-252, Prague, 1996. Czech Technical University Publishing House.
    • R. Anderson. The eternity service. In J. P?ribyl, editor, Proceedings of Pragocrypt '96, pages 242-252, Prague, 1996. Czech Technical University Publishing House.
  • 7
    • 11144284140 scopus 로고    scopus 로고
    • Implementing trustworthy internet based long term electronic preservation service - the eKeeper project
    • M. H. Hamza, editor, Internet, and Information Technology
    • A. Jerman Blazic and B. Dzonova-Jerman-Blazic. Implementing trustworthy internet based long term electronic preservation service - the eKeeper project. In M. H. Hamza, editor, IASTED International Conference on Communications, Internet, and Information Technology, pages 291-296, 2004.
    • (2004) IASTED International Conference on Communications , pp. 291-296
    • Jerman Blazic, A.1    Dzonova-Jerman-Blazic, B.2
  • 8
    • 33646072783 scopus 로고    scopus 로고
    • Provision of long-term archiving service for digitally signed documents using an archive interaction protocol
    • D. W. Chadwick and G. Zhao, editors
    • A. Jerman Blazic and P. Sylvester. Provision of long-term archiving service for digitally signed documents using an archive interaction protocol. In D. W. Chadwick and G. Zhao, editors, EuroPKI, pages 240-254, 2005.
    • (2005) EuroPKI , pp. 240-254
    • Jerman Blazic, A.1    Sylvester, P.2
  • 10
    • 35048871887 scopus 로고    scopus 로고
    • Using secret sharing for searching in encrypted data
    • W. Jonker and M. Petkovic, editors, Secure Data Management, of, Springer
    • R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In W. Jonker and M. Petkovic, editors, Secure Data Management, volume 3178 of Lecture Notes in Computer Science, pages 18-27. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3178 , pp. 18-27
    • Brinkman, R.1    Doumen, J.2    Jonker, W.3
  • 11
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • B. Pfitzmann, editor, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, of, London, UK, Springer
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann, editor, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 2045 of Lecture Notes in Computer Science, pages 93-118, London, UK, 2001. Springer.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 70349253583 scopus 로고    scopus 로고
    • C. Casten. The power of XAM. SNIA Data Management Forum
    • C. Casten. The power of XAM. SNIA Data Management Forum.
  • 13
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28(10):1030-1044, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 15
    • 38549123829 scopus 로고    scopus 로고
    • G. Danezis and C. Diaz. Space-efficient private search. In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007), 4886 of Lecture Notes in Computer Science, pages 148-162, Tobago, 2007. Springer-Verlag.
    • G. Danezis and C. Diaz. Space-efficient private search. In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007), volume 4886 of Lecture Notes in Computer Science, pages 148-162, Tobago, 2007. Springer-Verlag.
  • 18
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • Technical report
    • D. G. Filho and P. Barreto. Demonstrating data possession and uncheatable data transfer. Technical report, 2006. http://eprint.iacr.org/.
    • (2006)
    • Filho, D.G.1    Barreto, P.2
  • 20
    • 70349245971 scopus 로고    scopus 로고
    • International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS), 2003.
    • International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS), 2003.
  • 22
    • 36049042299 scopus 로고    scopus 로고
    • A content integrity service for long-term digital archives
    • The Society for Imaging Science and Technology, May
    • S. Haber and P. Kamat. A content integrity service for long-term digital archives. In IS&T Archiving Conference (Archiving 2006), volume 3, pages 159-164. The Society for Imaging Science and Technology, May 2006.
    • (2006) IS&T Archiving Conference (Archiving 2006) , vol.3 , pp. 159-164
    • Haber, S.1    Kamat, P.2
  • 24
    • 70349231866 scopus 로고    scopus 로고
    • European Telecommunication Standard Institute. ETSI TS 101 903 - XML advanced electronic signatures (XAdES), 2002.
    • European Telecommunication Standard Institute. ETSI TS 101 903 - XML advanced electronic signatures (XAdES), 2002.
  • 25
    • 70349255202 scopus 로고    scopus 로고
    • ITU. ITU-T rec. X.509|ISO/IEC 9594-8: The directory: Authentication framework, 2000.
    • ITU. ITU-T rec. X.509|ISO/IEC 9594-8: The directory: Authentication framework, 2000.
  • 27
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • N. Koblitz. Hyperelliptic cryptosystems. Journal of Cryptology, 1(3):139-150, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 139-150
    • Koblitz, N.1
  • 29
    • 70349228802 scopus 로고    scopus 로고
    • RSA Laboratories. PKCS#1v2.1: RSA cryptography standard, June 2002.
    • RSA Laboratories. PKCS#1v2.1: RSA cryptography standard, June 2002.
  • 31
    • 85084162796 scopus 로고    scopus 로고
    • Enabling the archival storage of signed documents
    • P. Maniatis and M. Baker. Enabling the archival storage of signed documents. In FAST, pages 31-45, 2002.
    • (2002) FAST , pp. 31-45
    • Maniatis, P.1    Baker, M.2
  • 32
    • 85084161556 scopus 로고    scopus 로고
    • Secure History Preservation Through Timeline Entanglement
    • San Francisco, CA, USA, August
    • P. Maniatis and M. Baker. Secure History Preservation Through Timeline Entanglement. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 2002.
    • (2002) Proceedings of the 11th USENIX Security Symposium
    • Maniatis, P.1    Baker, M.2
  • 34
    • 70349248961 scopus 로고    scopus 로고
    • 27 billion gigabytes to be archived by 2010
    • December
    • J. McAdams. 27 billion gigabytes to be archived by 2010. Computerworld, December 2007.
    • (2007) Computerworld
    • McAdams, J.1
  • 36
    • 0031696792 scopus 로고    scopus 로고
    • Cramming more components onto integrated circuits
    • G. E. Moore. Cramming more components onto integrated circuits. Proceedings of the IEEE, 86(1):82-85, 1998.
    • (1998) Proceedings of the IEEE , vol.86 , Issue.1 , pp. 82-85
    • Moore, G.E.1
  • 38
    • 38049002436 scopus 로고    scopus 로고
    • A survey of single-database private information retrieval: Techniques and applications
    • T. Okamoto and X. Wang, editors, Public Key Cryptography, of, Springer-Verlag
    • R. Ostrovsky and W. E. Skeith III. A survey of single-database private information retrieval: Techniques and applications. In T. Okamoto and X. Wang, editors, Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, pages 393-411. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4450 , pp. 393-411
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 39
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 40
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 41
    • 70349228801 scopus 로고    scopus 로고
    • M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 143?U-156. USENIX, June 2007.
    • M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 143?U-156. USENIX, June 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.