메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 136-151

Authentic time-stamps for archival storage

Author keywords

Archival storage; Authenticated data structures; Regulatory compliance; Time stamping

Indexed keywords

ARCHIVAL STORAGE; AUTHENTICATED DATA STRUCTURES; CONTENT INTEGRITY; DOCUMENT REPOSITORIES; EXPERIMENTAL EVALUATION; LOCAL DATA; NON-EXISTENCE; SARBANES-OXLEY ACT; SECURITIES AND EXCHANGE COMMISSIONS; TIME-STAMPING; TRUSTED PARTY;

EID: 70350374371     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_9     Document Type: Conference Paper
Times cited : (9)

References (33)
  • 1
    • 21044449695 scopus 로고    scopus 로고
    • Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 379-393. Springer, Heidelberg (2001)
    • Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001)
  • 3
    • 70350356194 scopus 로고    scopus 로고
    • Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report TRMCS- 91-1, Clarkson University, Departments of Mathematics and Computer Science (1991)
    • Benaloh, J., de Mare, M.: Efficient broadcast time-stamping. Technical report TRMCS- 91-1, Clarkson University, Departments of Mathematics and Computer Science (1991)
  • 4
    • 77954337428 scopus 로고    scopus 로고
    • CHRONOS: An authenticated dictionary based on skip lists for time-stamping systems
    • ACM, New York
    • Blibech, K., Gabillon, A.: CHRONOS: An authenticated dictionary based on skip lists for time-stamping systems. In: Proc. Workshop on Secure Web Services, pp. 84-90. ACM, New York (2005)
    • (2005) Proc. Workshop on Secure Web Services , pp. 84-90
    • Blibech, K.1    Gabillon, A.2
  • 5
    • 33745884379 scopus 로고    scopus 로고
    • A new time-stamping scheme based on skip lists
    • Gavrilova, M.L, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Lagana, A, Mun, Y, Choo, H, eds, ICCSA 2006, Springer, Heidelberg
    • Blibech, K., Gabillon, A.: A new time-stamping scheme based on skip lists. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagana, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 395-405. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3982 , pp. 395-405
    • Blibech, K.1    Gabillon, A.2
  • 6
    • 70350399783 scopus 로고    scopus 로고
    • Buldas, A., Laud, P.: New linking schemes for digital time-stamping. In: Proc. 1st International Conference on Information Security and Cryptology (ICISC), pp. 3-13. Korea Institute of Information Security and Cryptology, KIISC (1998)
    • Buldas, A., Laud, P.: New linking schemes for digital time-stamping. In: Proc. 1st International Conference on Information Security and Cryptology (ICISC), pp. 3-13. Korea Institute of Information Security and Cryptology, KIISC (1998)
  • 8
    • 84956984263 scopus 로고    scopus 로고
    • Time-stamping with binary linking schemes
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Buldas, A., Laud, P., Lipmaa, H., Villemson, J.: Time-stamping with binary linking schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 486-501. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 486-501
    • Buldas, A.1    Laud, P.2    Lipmaa, H.3    Villemson, J.4
  • 9
    • 33645986453 scopus 로고    scopus 로고
    • Buldas, A., Laud, P., Saarepera, M., Villemson, J.: Universally composable timestamping schemes with audit. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 359-373. Springer, Heidelberg (2005)
    • Buldas, A., Laud, P., Saarepera, M., Villemson, J.: Universally composable timestamping schemes with audit. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 359-373. Springer, Heidelberg (2005)
  • 10
    • 84957803060 scopus 로고    scopus 로고
    • Buldas, A., Laud, P., Schoenmakers, B.: Optimally efficient accountable timestamping. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 293-305. Springer, Heidelberg (2000)
    • Buldas, A., Laud, P., Schoenmakers, B.: Optimally efficient accountable timestamping. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 293-305. Springer, Heidelberg (2000)
  • 11
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 70350370681 scopus 로고    scopus 로고
    • Cohen, W.: Enron email dataset, http://www.cs.cmu.edu/̃enron
    • Cohen, W.: Enron email dataset, http://www.cs.cmu.edu/̃enron
  • 15
    • 70350401080 scopus 로고    scopus 로고
    • EMC, Centera Compliance Edition Plus, http://www.emc.com/products/detail/ hardware/centera-compliance-edition-plus.htm
    • EMC, Centera Compliance Edition Plus, http://www.emc.com/products/detail/ hardware/centera-compliance-edition-plus.htm
  • 16
    • 37149025723 scopus 로고    scopus 로고
    • Goodrich, M., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Demetrescu, C. (ed.) WEA 2007. LNCS, 4525, pp. 94-107. Springer, Heidelberg (2007)
    • Goodrich, M., Papamanthou, C., Tamassia, R.: On the cost of persistence and authentication in skip lists. In: Demetrescu, C. (ed.) WEA 2007. LNCS, vol. 4525, pp. 94-107. Springer, Heidelberg (2007)
  • 18
    • 0141873829 scopus 로고
    • Efficient authenticated dictionaries with skip lists and commutative hashing
    • Johns Hopkins Information Security Institute
    • Goodrich, M., Tamassia, R.: Efficient authenticated dictionaries with skip lists and commutative hashing. technical report, Johns Hopkins Information Security Institute (1991), http://www.cs.jhu.edu/̃goodrich/cgc/pubs/ hashskip.pdf
    • (1991) technical report
    • Goodrich, M.1    Tamassia, R.2
  • 19
    • 84945279475 scopus 로고    scopus 로고
    • An efficient dynamic and distributed cryptographic accumulator
    • Bertrand, G, Imiya, A, Klette, R, eds, Digital and Image Geometry, Springer, Heidelberg
    • Goodrich, M., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Bertrand, G., Imiya, A., Klette, R. (eds.) Digital and Image Geometry. LNCS, vol. 2243, pp. 372-388. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2243 , pp. 372-388
    • Goodrich, M.1    Tamassia, R.2    Hasic, J.3
  • 21
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • Haber, S., Stornetta, W.S.: How to time-stamp a digital document. Journal of Cryptology 3(2), 99-111 (1991)
    • (1991) Journal of Cryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber, S.1    Stornetta, W.S.2
  • 24
    • 70350367068 scopus 로고    scopus 로고
    • Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, 1465, pp. 951-980. Springer, Heidelberg (1998)
    • Kocher, P.: On certificate revocation and validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 951-980. Springer, Heidelberg (1998)
  • 25
    • 70350361884 scopus 로고    scopus 로고
    • Databank: An economics based privacy preserving system for distributing relevant advertising and content
    • Technical report HPL-2006-95, HP Laboratories
    • Lukose, R.M., Lillibridge, M.: Databank: An economics based privacy preserving system for distributing relevant advertising and content. Technical report HPL-2006-95, HP Laboratories (2006)
    • (2006)
    • Lukose, R.M.1    Lillibridge, M.2
  • 27
    • 85084161556 scopus 로고    scopus 로고
    • Secure history preservation through timeline entanglement
    • USENIX
    • Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: Proc. 11th USENIX Security Symposium, pp. 297-312. USENIX (2002)
    • (2002) Proc. 11th USENIX Security Symposium , pp. 297-312
    • Maniatis, P.1    Baker, M.2
  • 28
    • 84969346266 scopus 로고
    • A cerified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.: A cerified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.1
  • 32
    • 70350361885 scopus 로고    scopus 로고
    • Sion, R.: Strong WORM. In: Proc. of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society Press, Los Alamitos (2008)
    • Sion, R.: Strong WORM. In: Proc. of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society Press, Los Alamitos (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.