메뉴 건너뛰기




Volumn 57, Issue 7-8, 2013, Pages 1578-1591

A secure log architecture to support remote auditing

Author keywords

Public key cryptography; Remote auditing; Secure digital archiving; Secure log architecture

Indexed keywords

DIGITAL ARCHIVING; DIGITAL BLACK; DISTRIBUTED SYSTEMS; FORENSIC EVIDENCE; KEYWORD RETRIEVAL; REMOTE AUDITING; TRUSTED COMPUTING PLATFORM;

EID: 84875384473     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2012.06.035     Document Type: Article
Times cited : (15)

References (46)
  • 1
    • 34548317524 scopus 로고    scopus 로고
    • IT audit: a critical business process
    • Carlin A., Gallegos F. IT audit: a critical business process. IEEE Computer 2007, 40(7):87-89.
    • (2007) IEEE Computer , vol.40 , Issue.7 , pp. 87-89
    • Carlin, A.1    Gallegos, F.2
  • 2
    • 77951442815 scopus 로고    scopus 로고
    • Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
    • Müller G., Accorsi R., Höhn S., Sackmann S. Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Informatik Spektrum 2010, 33(1):3-13.
    • (2010) Informatik Spektrum , vol.33 , Issue.1 , pp. 3-13
    • Müller, G.1    Accorsi, R.2    Höhn, S.3    Sackmann, S.4
  • 6
    • 4243139559 scopus 로고    scopus 로고
    • On auditing audit trails
    • Mercuri R. On auditing audit trails. Communications of the ACM 2003, 46(1):17-20.
    • (2003) Communications of the ACM , vol.46 , Issue.1 , pp. 17-20
    • Mercuri, R.1
  • 7
    • 71249116454 scopus 로고    scopus 로고
    • Safe-keeping digital evidence with secure logging protocols: state of the art and challenges
    • IEEE Computer Society, O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.)
    • Accorsi R. Safe-keeping digital evidence with secure logging protocols: state of the art and challenges. Proceedings the IEEE Conference on Incident Management and Forensics 2009, 94-110. IEEE Computer Society. O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.).
    • (2009) Proceedings the IEEE Conference on Incident Management and Forensics , pp. 94-110
    • Accorsi, R.1
  • 8
    • 77952589508 scopus 로고    scopus 로고
    • Building an encrypted and searchable audit log
    • Proceedings of the 11th Annual Network and Distributed System Security Symposium
    • B. Waters, D. Balfanz, G. Durfee, D. Smetters, Building an encrypted and searchable audit log, in: Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004.
    • (2004)
    • Waters, B.1    Balfanz, D.2    Durfee, G.3    Smetters, D.4
  • 9
    • 0038223020 scopus 로고    scopus 로고
    • Forward integrity for secure audit logs
    • University of California, San Diego, Dept. of Computer Science & Engineering
    • M. Bellare, B. Yee, Forward integrity for secure audit logs, Tech. Rep., University of California, San Diego, Dept. of Computer Science & Engineering, 1997.
    • (1997) Tech. Rep.
    • Bellare, M.1    Yee, B.2
  • 11
    • 81455142699 scopus 로고    scopus 로고
    • Finding vulnerabilities in SOA-based business processes
    • Lowis L., Accorsi R. Finding vulnerabilities in SOA-based business processes. IEEE Transactions on Service Computing 2011, 4(3):230-242.
    • (2011) IEEE Transactions on Service Computing , vol.4 , Issue.3 , pp. 230-242
    • Lowis, L.1    Accorsi, R.2
  • 13
    • 84883001875 scopus 로고    scopus 로고
    • Detective information flow analysis for business processes
    • Springer, W. Abramowicz, L. Macaszek, R. Kowalczyk, A. Speck (Eds.) Business Processes, Services Computing and Intelligent Service Management
    • Accorsi R., Wonnemann C. Detective information flow analysis for business processes. Lecture Notes in Informatics 2009, vol. 147:223-224. Springer. W. Abramowicz, L. Macaszek, R. Kowalczyk, A. Speck (Eds.).
    • (2009) Lecture Notes in Informatics , vol.147 , pp. 223-224
    • Accorsi, R.1    Wonnemann, C.2
  • 15
    • 79960722523 scopus 로고    scopus 로고
    • Towards forensic data flow analysis of business process logs
    • IEEE Computer Society, O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.)
    • Accorsi R., Wonnemann C., Stocker T. Towards forensic data flow analysis of business process logs. Proceedings the IEEE Conference on Incident Management and Forensics 2011, 94-110. IEEE Computer Society. O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.).
    • (2011) Proceedings the IEEE Conference on Incident Management and Forensics , pp. 94-110
    • Accorsi, R.1    Wonnemann, C.2    Stocker, T.3
  • 16
    • 84863590198 scopus 로고    scopus 로고
    • On the exploitation of process mining for security audits: the conformance checking case
    • ACM Press
    • Accorsi R., Stocker T. On the exploitation of process mining for security audits: the conformance checking case. ACM Symposium on Applied Computing 2012, 1709-1716. ACM Press.
    • (2012) ACM Symposium on Applied Computing , pp. 1709-1716
    • Accorsi, R.1    Stocker, T.2
  • 18
    • 70449688082 scopus 로고    scopus 로고
    • Automated counterexample-driven audits of authentic system records
    • Ph.D. Thesis, University of Freiburg
    • R. Accorsi, Automated counterexample-driven audits of authentic system records, Ph.D. Thesis, University of Freiburg, 2008.
    • (2008)
    • Accorsi, R.1
  • 19
    • 84875387046 scopus 로고    scopus 로고
    • RFC3164: the BSD syslog protocol, request for comments
    • C. Lonvick, RFC3164: the BSD syslog protocol, request for comments, 2001. http://www.ietf.org/rfc/rfc3164.txt.
    • (2001)
    • Lonvick, C.1
  • 20
    • 33745809434 scopus 로고    scopus 로고
    • Delegating secure logging in pervasive computing systems
    • Springer, J. Clark, R. Paige, F. Pollack, P. Brooke (Eds.) Proceedings of the 3rd International Conference on Security in Pervasive Computing
    • Accorsi R., Hohl A. Delegating secure logging in pervasive computing systems. Lecture Notes in Computer Science 2006, vol. 3934:58-72. Springer. J. Clark, R. Paige, F. Pollack, P. Brooke (Eds.).
    • (2006) Lecture Notes in Computer Science , vol.3934 , pp. 58-72
    • Accorsi, R.1    Hohl, A.2
  • 21
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B. A note on the confinement problem. Communications of the ACM 1973, 16(10):613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 24
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 1981, 24(11):770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 1978, 21(12):993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 26
  • 27
    • 84875395024 scopus 로고    scopus 로고
    • Automated validation of Internet security protocols and applications
    • Automated validation of Internet security protocols and applications, 2008. http://www.avispa-project.org/.
    • (2008)
  • 29
    • 33748532138 scopus 로고    scopus 로고
    • Personalization in privacy-aware highly dynamic systems
    • Sackmann S., Strüker J., Accorsi R. Personalization in privacy-aware highly dynamic systems. Communications of the ACM 2006, 49(9):32-38.
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 32-38
    • Sackmann, S.1    Strüker, J.2    Accorsi, R.3
  • 30
    • 77952050502 scopus 로고    scopus 로고
    • On fast verification of hash chains
    • Springer, J. Pieprzyk (Ed.) Topics in Cryptology
    • Yum D., Kim J., Lee P., Hong S. On fast verification of hash chains. Lecture Notes in Computer Science 2010, vol. 5985:382-396. Springer. J. Pieprzyk (Ed.).
    • (2010) Lecture Notes in Computer Science , vol.5985 , pp. 382-396
    • Yum, D.1    Kim, J.2    Lee, P.3    Hong, S.4
  • 32
    • 65849178422 scopus 로고    scopus 로고
    • A new approach to secure logging
    • Ma D., Tsudik G. A new approach to secure logging. ACM Transactions on Storage 2009, 5(1):1-21.
    • (2009) ACM Transactions on Storage , vol.5 , Issue.1 , pp. 1-21
    • Ma, D.1    Tsudik, G.2
  • 33
    • 84875389394 scopus 로고    scopus 로고
    • Reliable syslog.
    • Reliable syslog. http://security.sdsc.edu/software/sdsc-syslog/.
  • 34
    • 84884742409 scopus 로고    scopus 로고
    • Signed syslog messages
    • IETF Internet Draft
    • J. Kelsey, J. Callas, Signed syslog messages, IETF Internet Draft, 2005. http://www.ietf.org/internet-drafts/draft-ietf-syslog-sign-16.txt.
    • (2005)
    • Kelsey, J.1    Callas, J.2
  • 35
    • 84875408763 scopus 로고    scopus 로고
    • Syslog-ng web site.
    • Syslog-ng web site. http://www.balabit.com/products/syslog_ng/.
  • 36
    • 33748570319 scopus 로고    scopus 로고
    • On the relationship of privacy and secure remote logging in dynamic systems
    • Springer, S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog (Eds.) Security and Privacy in Dynamic Environments
    • Accorsi R. On the relationship of privacy and secure remote logging in dynamic systems. IFIP Conference Proceedings 2006, vol. 201:329-339. Springer. S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog (Eds.).
    • (2006) IFIP Conference Proceedings , vol.201 , pp. 329-339
    • Accorsi, R.1
  • 37
    • 84885750799 scopus 로고    scopus 로고
    • A framework for secure and verifiable logging in public communication networks
    • Springer, J. Lopez (Ed.) Proceedings of the Workshop on Critical Information Infrastructures Security
    • Stathopoulos V., Kotzanikolaou P., Magkos E. A framework for secure and verifiable logging in public communication networks. Lecture Notes in Computer Science 2006, vol. 4347:273-284. Springer. J. Lopez (Ed.).
    • (2006) Lecture Notes in Computer Science , vol.4347 , pp. 273-284
    • Stathopoulos, V.1    Kotzanikolaou, P.2    Magkos, E.3
  • 38
    • 70449635348 scopus 로고    scopus 로고
    • Secure audit logging with tamper-resistant hardware
    • Kluwer, D. Gritzalis, S.D.C. di Vimercati, P. Samarati, S. Katsikas (Eds.) Security and Privacy in the Age of Uncertainty
    • Chong C., Peng Z., Hartel P. Secure audit logging with tamper-resistant hardware. IFIP Conference Proceedings 2003, vol. 250:73-84. Kluwer. D. Gritzalis, S.D.C. di Vimercati, P. Samarati, S. Katsikas (Eds.).
    • (2003) IFIP Conference Proceedings , vol.250 , pp. 73-84
    • Chong, C.1    Peng, Z.2    Hartel, P.3
  • 39
    • 84872795246 scopus 로고    scopus 로고
    • Logcrypt: forward security and public verification for secure audit logs
    • Australian Computer Society, R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, W. Susilo (Eds.) Proceedings of the Australasian Symposium on Grid Computing and e-Research
    • Holt J. Logcrypt: forward security and public verification for secure audit logs. CRIPT 2006, vol. 54:203-211. Australian Computer Society. R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, W. Susilo (Eds.).
    • (2006) CRIPT , vol.54 , pp. 203-211
    • Holt, J.1
  • 41
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: improved definitions and efficient constructions
    • ACM, A. Juels, R. Wright, S.D.C. di Vimercati (Eds.)
    • Curtmola R., Garay J., Kamara S., Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. ACM Conference on Computer and Communications Security 2006, 79-88. ACM. A. Juels, R. Wright, S.D.C. di Vimercati (Eds.).
    • (2006) ACM Conference on Computer and Communications Security , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 42
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Boneh D., Franklin M. Identity based encryption from the Weil pairing. SIAM Journal of Computing 2003, 32(3):586-615.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 43
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970, 13(7):422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 44
    • 84875404012 scopus 로고    scopus 로고
    • A PKI based secure audit web server
    • IASTED Communications, Network and Information
    • W. Xu, D. Chadwick, S. Otenko, A PKI based secure audit web server, in: IASTED Communications, Network and Information, 2005.
    • (2005)
    • Xu, W.1    Chadwick, D.2    Otenko, S.3
  • 45
    • 3042855722 scopus 로고    scopus 로고
    • Digital logs-proof matters
    • Kenneally E. Digital logs-proof matters. Digital Investigation 2004, 1(2):94-101.
    • (2004) Digital Investigation , vol.1 , Issue.2 , pp. 94-101
    • Kenneally, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.