-
3
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
DOI 10.1109/MCOM.2008.4481350
-
Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Communications Magazine, Vol. 46, No. 4, Apr. 2008, pp. 116-126. 10.1109/MCOM.2008.4481350 (Pubitemid 351593417)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
4
-
-
54049099812
-
-
Pearson Prentice Hall, Upper Saddle River, New Jersey 07458, U. S. A.
-
W. Stallings and L. Brown, Computer Security: Principles and Practice, Pearson Prentice Hall, Upper Saddle River, New Jersey 07458, U. S. A., 2008
-
(2008)
Computer Security: Principles and Practice
-
-
Stallings, W.1
Brown, L.2
-
5
-
-
4243139559
-
On auditing audit trails
-
January
-
Rebecca T. Mercuri, "On auditing audit trails," Communications of the ACM, vol. 46, no. 1, pp. 17-20, January, 2003
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 17-20
-
-
Mercuri, R.T.1
-
6
-
-
0004233425
-
-
8th Edition, Wiley, July 28
-
Abraham Silberschatz, Peter B. Galvin, and Greg Gagne, Operating System Concepts, 8th Edition, Wiley, July 28, 2008
-
(2008)
Operating System Concepts
-
-
Silberschatz, A.1
Galvin, P.B.2
Gagne, G.3
-
7
-
-
84863165936
-
-
SUSE Linux AG, SUSE Linux AG and Novell, Inc, 2004, see: September 28
-
SUSE Linux AG, "Linux Audit-Subsystem Design Documentation for Kernel 2.6, Version 0.1," SUSE Linux AG and Novell, Inc, 2004, see: http://www.uniforum.chi.il.us/slides/HardeningLinux/LAuS-Design.pdf, September 28, 2007.
-
(2007)
Linux Audit-Subsystem Design Documentation for Kernel 2.6, Version 0.1
-
-
-
9
-
-
84958776015
-
Personal Secure Booting
-
N. Itoi, W. A. Arbaugh, S. J. Pollack, and D. M. Reeves, "Personal Secure Booting," Lecture Notes in Computer Science, Volume 2119/2001, pp. 130-144, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2119
, Issue.2001
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.J.3
Reeves, D.M.4
-
12
-
-
84863165935
-
Common Criteria: Launching the International Standard
-
National Institute of Standard and Technology, Information Technology Laboratory, November Available
-
NIST ITL, "Common Criteria: Launching the International Standard," NIST ITL Security Bulletin, National Institute of Standard and Technology, Information Technology Laboratory, November 1998, Available: http://csrc.nist.gov/publications/nistbul/11-98.pdf
-
(1998)
NIST ITL Security Bulletin
-
-
-
13
-
-
0003765587
-
-
The International Organization for Standardization, Version 3.1, September Available
-
The International Organization for Standardization, "Common Criteria for Information Technology Security Evaluation (CC)," Version 3.1, September 2006, Available: http://www.commoncriteriaportal.org/public/consumer/ index.php?menu=2.
-
(2006)
Common Criteria for Information Technology Security Evaluation (CC)
-
-
-
14
-
-
84863165934
-
-
October 10, Available
-
Microsoft, "The Threats and Countermeasures Guide," October 10, 2007, Available: http://www.microsoft.com/technet/security/guidance/ serversecurity/tcg/tcgch00.mspx
-
(2007)
The Threats and Countermeasures Guide
-
-
-
15
-
-
84863134922
-
-
October 10, Available
-
Microsoft, "The Audit Management in Windows 2000," October 10, 2007, Available: http://www.microsoft.com/technet/security/prodtech/windows2000/ w2kccadm/auditman/w2kadm22.mspx
-
(2007)
The Audit Management in Windows 2000
-
-
-
16
-
-
84863137058
-
-
October 10, Available
-
Microsoft, "The Audit Collection Services," October 10, 2007, Available: http://technet.microsoft.com/enus/library/bb381258.aspx
-
(2007)
The Audit Collection Services
-
-
-
17
-
-
84863137062
-
-
September 28, Available
-
Redhat, Inc, "Linux Audit Discussion," September 28, 2007 Available: http://www.redhat.com/mailman/listinfo/linux-audit
-
(2007)
Linux Audit Discussion
-
-
-
18
-
-
0003951497
-
-
Sun Microsystems, Inc, Mountain View, CA 94303, USA, Available
-
Sun Microsystems, Inc, "SunSHIELD Basic Security Module Guide," Sun Microsystems, Inc, Mountain View, CA 94303, USA, 2000, Available: http://dlc.sun.com/pdf/806-1789/806-1789.pdf
-
(2000)
SunSHIELD Basic Security Module Guide
-
-
-
19
-
-
80052756592
-
-
A Project of Markle Foundation, New York City, February
-
Z. Baird and J. Barksdale, "Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability," A Project of Markle Foundation, New York City, February, 2006.
-
(2006)
Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability
-
-
Baird, Z.1
Barksdale, J.2
-
20
-
-
0038223020
-
-
Technical Report, Department of Computer Science and Engineering, University of California at San Diego, November
-
M. Bellare and B. Yee, "Forward Integrity for Secure Audit Logs," Technical Report, Department of Computer Science and Engineering, University of California at San Diego, November, 1997.
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Bellare, M.1
Yee, B.2
-
21
-
-
34250213398
-
A Policy-Driven Contact-Based Security Protocol for Protecting Audit Logs on Wireless Devices
-
September
-
W. Itani, A. Kayssi, A. Chehab, and C. Gaspard, "A Policy-Driven Contact-Based Security Protocol for Protecting Audit Logs on Wireless Devices," International Journal of Network Security, Vol. 3, No. 2, pp.124-135, September 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 124-135
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
Gaspard, C.4
-
22
-
-
0031177289
-
Remote auditing of software outputs using a trusted coprocessor
-
PII S0167739X97000046
-
B. Schneier and J. Kelsey, "Remote Auditing of Software Outputs Using a Trusted Coprocessor," Future Generation Computer Systems, Vol. 13, No. 1, pp.9-18, July 1997. (Pubitemid 127382569)
-
(1997)
Future Generation Computer Systems
, vol.13
, Issue.1
, pp. 9-18
-
-
Schneier, B.1
Kelsey, J.2
-
23
-
-
85021950441
-
Secure Audit Logs to Support Computer Forensics
-
May
-
B. Schneier and J. Kelsey, "Secure Audit Logs to Support Computer Forensics," ACM Transactions on Information and System Security, Vol. 2, No. 2, pp.59-196, May 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 59-196
-
-
Schneier, B.1
Kelsey, J.2
-
24
-
-
85084161255
-
Cryptographic Support for Secure Logs on Untrusted Machines
-
Berkeley, CA, January
-
B. Schnerer and J. Kelsey, "Cryptographic Support for Secure Logs on Untrusted Machines," Proceedings of the 7th USENIX Security Symposium, pp.53-62, Berkeley, CA, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 53-62
-
-
Schnerer, B.1
Kelsey, J.2
-
25
-
-
74049120743
-
Countering Kernel Rootkits with Lightweight Hook Protection
-
Z. Wang, X. Jiang, W. Cui and P. Ning, "Countering Kernel Rootkits with Lightweight Hook Protection," Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), pp. 545-554, 2009
-
(2009)
Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
28
-
-
70350060199
-
Flow-Net Methodology for Accountability in Wireless Networks
-
Sept./Oct.
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
29
-
-
84255195594
-
Accountability using Flow-net: Design, Implementation, and Performance Evaluation
-
accepted, DOI:10.1002/sec.348
-
Y. Xiao, K. Meng, and D. Takahashi, "Accountability using Flow-net: Design, Implementation, and Performance Evaluation," (Wiley Journal of) Security and Communication Networks, Special Issue on Security and Privacy in Emerging Information Technologies, accepted, DOI:10.1002/sec.348.
-
(Wiley Journal Of) Security and Communication Networks, Special Issue on Security and Privacy in Emerging Information Technologies
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
|