메뉴 건너뛰기




Volumn , Issue , 2012, Pages 48-55

A resilient architecture for forensic storage of events in critical infrastructures

Author keywords

Critical Infrastructure Protection; Fault and Intrusion Tolerant Architecture; Forensic Storage; Threshold Cryptography

Indexed keywords

CLASSIC ALGORITHM; CRITICAL INFRASTRUCTURE PROTECTION; EXPERIMENTAL TEST; FORENSIC ANALYSIS; LEGAL PROCEEDINGS; SECRET KEY; SECURITY BREACHES; SECURITY EVENTS; THRESHOLD CRYPTOGRAPHY;

EID: 84871993542     PISSN: 15302059     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2012.9     Document Type: Conference Paper
Times cited : (24)

References (21)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • ACM
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". Commun. ACM, ACM, 1978, 21, 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 84871955504 scopus 로고    scopus 로고
    • Assuria Log Manager, Assuria Ltd. Last Accessed 7th June 2012
    • Assuria Log Manager, Assuria Ltd. http://www.assuria.com/products-new/ assuria-log-manager/features.html Last Accessed 7th June 2012
  • 7
    • 0018545449 scopus 로고
    • How to share a secret
    • ACM
    • A. Shamir, "How to share a secret", Commun. ACM, ACM, 1979, 22, 612-613
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 9
    • 84948954277 scopus 로고    scopus 로고
    • Practical Threshold Signatures
    • V. Shoup, "Practical Threshold Signatures". EUROCRYPT'00, 2000, 207-220
    • (2000) EUROCRYPT'00 , pp. 207-220
    • Shoup, V.1
  • 16
    • 60449100156 scopus 로고    scopus 로고
    • The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
    • Jan.-March doi: 10.1109/TDSC.2008.1
    • A. Saidane, V. Nicomette, and Y. Deswarte, "The Design of a Generic Intrusion-Tolerant Architecture for Web Servers" Dependable and Secure Computing, IEEE Transactions on , vol.6, no.1, pp.45-58, Jan.-March 2009 doi: 10.1109/TDSC.2008.1
    • (2009) Dependable and Secure Computing, IEEE Transactions on , vol.6 , Issue.1 , pp. 45-58
    • Saidane, A.1    Nicomette, V.2    Deswarte, Y.3
  • 19
    • 84871943682 scopus 로고    scopus 로고
    • AlienVault Risk Metrics http://www.alienvault.com/wiki/doku.php?id=user- manual:dashboards:risk:risk-metrics
    • AlienVault Risk Metrics
  • 20
    • 84871985530 scopus 로고    scopus 로고
    • Scenario Requirements http://www.massif-project.eu/sites/default/files/ deliverables/D2.1.1-Scenario-Requirements-v1.0-public.pdf
    • Scenario Requirements


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.