-
1
-
-
34548317524
-
IT audit: a critical business process
-
Carlin A., Gallegos F. IT audit: a critical business process. IEEE Computer 2007, 40(7):87-89.
-
(2007)
IEEE Computer
, vol.40
, Issue.7
, pp. 87-89
-
-
Carlin, A.1
Gallegos, F.2
-
2
-
-
77951442815
-
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
-
Müller G., Accorsi R., Höhn S., Sackmann S. Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Informatik Spektrum 2010, 33(1):3-13.
-
(2010)
Informatik Spektrum
, vol.33
, Issue.1
, pp. 3-13
-
-
Müller, G.1
Accorsi, R.2
Höhn, S.3
Sackmann, S.4
-
5
-
-
74049093526
-
Controlling data in the cloud: outsourcing computation without outsourcing control
-
ACM
-
Chow R., Golle P., Jakobsson M., Shi E., Staddon J., Masuoka R., Molina J. Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the ACM Workshop on Cloud Computing Security 2009, 85-90. ACM.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
6
-
-
4243139559
-
On auditing audit trails
-
Mercuri R. On auditing audit trails. Communications of the ACM 2003, 46(1):17-20.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 17-20
-
-
Mercuri, R.1
-
7
-
-
71249116454
-
Safe-keeping digital evidence with secure logging protocols: state of the art and challenges
-
IEEE Computer Society, O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.)
-
Accorsi R. Safe-keeping digital evidence with secure logging protocols: state of the art and challenges. Proceedings the IEEE Conference on Incident Management and Forensics 2009, 94-110. IEEE Computer Society. O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.).
-
(2009)
Proceedings the IEEE Conference on Incident Management and Forensics
, pp. 94-110
-
-
Accorsi, R.1
-
8
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
B. Waters, D. Balfanz, G. Durfee, D. Smetters, Building an encrypted and searchable audit log, in: Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004.
-
(2004)
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
9
-
-
0038223020
-
Forward integrity for secure audit logs
-
University of California, San Diego, Dept. of Computer Science & Engineering
-
M. Bellare, B. Yee, Forward integrity for secure audit logs, Tech. Rep., University of California, San Diego, Dept. of Computer Science & Engineering, 1997.
-
(1997)
Tech. Rep.
-
-
Bellare, M.1
Yee, B.2
-
11
-
-
81455142699
-
Finding vulnerabilities in SOA-based business processes
-
Lowis L., Accorsi R. Finding vulnerabilities in SOA-based business processes. IEEE Transactions on Service Computing 2011, 4(3):230-242.
-
(2011)
IEEE Transactions on Service Computing
, vol.4
, Issue.3
, pp. 230-242
-
-
Lowis, L.1
Accorsi, R.2
-
13
-
-
84883001875
-
Detective information flow analysis for business processes
-
Springer, W. Abramowicz, L. Macaszek, R. Kowalczyk, A. Speck (Eds.) Business Processes, Services Computing and Intelligent Service Management
-
Accorsi R., Wonnemann C. Detective information flow analysis for business processes. Lecture Notes in Informatics 2009, vol. 147:223-224. Springer. W. Abramowicz, L. Macaszek, R. Kowalczyk, A. Speck (Eds.).
-
(2009)
Lecture Notes in Informatics
, vol.147
, pp. 223-224
-
-
Accorsi, R.1
Wonnemann, C.2
-
15
-
-
79960722523
-
Towards forensic data flow analysis of business process logs
-
IEEE Computer Society, O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.)
-
Accorsi R., Wonnemann C., Stocker T. Towards forensic data flow analysis of business process logs. Proceedings the IEEE Conference on Incident Management and Forensics 2011, 94-110. IEEE Computer Society. O. Goebel, R. Ehlert, S. Frings, D. Günther, H. Morgenstern, D. Schadt (Eds.).
-
(2011)
Proceedings the IEEE Conference on Incident Management and Forensics
, pp. 94-110
-
-
Accorsi, R.1
Wonnemann, C.2
Stocker, T.3
-
16
-
-
84863590198
-
On the exploitation of process mining for security audits: the conformance checking case
-
ACM Press
-
Accorsi R., Stocker T. On the exploitation of process mining for security audits: the conformance checking case. ACM Symposium on Applied Computing 2012, 1709-1716. ACM Press.
-
(2012)
ACM Symposium on Applied Computing
, pp. 1709-1716
-
-
Accorsi, R.1
Stocker, T.2
-
18
-
-
70449688082
-
Automated counterexample-driven audits of authentic system records
-
Ph.D. Thesis, University of Freiburg
-
R. Accorsi, Automated counterexample-driven audits of authentic system records, Ph.D. Thesis, University of Freiburg, 2008.
-
(2008)
-
-
Accorsi, R.1
-
19
-
-
84875387046
-
-
RFC3164: the BSD syslog protocol, request for comments
-
C. Lonvick, RFC3164: the BSD syslog protocol, request for comments, 2001. http://www.ietf.org/rfc/rfc3164.txt.
-
(2001)
-
-
Lonvick, C.1
-
20
-
-
33745809434
-
Delegating secure logging in pervasive computing systems
-
Springer, J. Clark, R. Paige, F. Pollack, P. Brooke (Eds.) Proceedings of the 3rd International Conference on Security in Pervasive Computing
-
Accorsi R., Hohl A. Delegating secure logging in pervasive computing systems. Lecture Notes in Computer Science 2006, vol. 3934:58-72. Springer. J. Clark, R. Paige, F. Pollack, P. Brooke (Eds.).
-
(2006)
Lecture Notes in Computer Science
, vol.3934
, pp. 58-72
-
-
Accorsi, R.1
Hohl, A.2
-
21
-
-
0015672289
-
A note on the confinement problem
-
Lampson B. A note on the confinement problem. Communications of the ACM 1973, 16(10):613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
24
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981, 24(11):770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 1978, 21(12):993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
27
-
-
84875395024
-
Automated validation of Internet security protocols and applications
-
Automated validation of Internet security protocols and applications, 2008. http://www.avispa-project.org/.
-
(2008)
-
-
-
30
-
-
77952050502
-
On fast verification of hash chains
-
Springer, J. Pieprzyk (Ed.) Topics in Cryptology
-
Yum D., Kim J., Lee P., Hong S. On fast verification of hash chains. Lecture Notes in Computer Science 2010, vol. 5985:382-396. Springer. J. Pieprzyk (Ed.).
-
(2010)
Lecture Notes in Computer Science
, vol.5985
, pp. 382-396
-
-
Yum, D.1
Kim, J.2
Lee, P.3
Hong, S.4
-
33
-
-
84875389394
-
-
Reliable syslog.
-
Reliable syslog. http://security.sdsc.edu/software/sdsc-syslog/.
-
-
-
-
34
-
-
84884742409
-
Signed syslog messages
-
IETF Internet Draft
-
J. Kelsey, J. Callas, Signed syslog messages, IETF Internet Draft, 2005. http://www.ietf.org/internet-drafts/draft-ietf-syslog-sign-16.txt.
-
(2005)
-
-
Kelsey, J.1
Callas, J.2
-
35
-
-
84875408763
-
-
Syslog-ng web site.
-
Syslog-ng web site. http://www.balabit.com/products/syslog_ng/.
-
-
-
-
36
-
-
33748570319
-
On the relationship of privacy and secure remote logging in dynamic systems
-
Springer, S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog (Eds.) Security and Privacy in Dynamic Environments
-
Accorsi R. On the relationship of privacy and secure remote logging in dynamic systems. IFIP Conference Proceedings 2006, vol. 201:329-339. Springer. S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog (Eds.).
-
(2006)
IFIP Conference Proceedings
, vol.201
, pp. 329-339
-
-
Accorsi, R.1
-
37
-
-
84885750799
-
A framework for secure and verifiable logging in public communication networks
-
Springer, J. Lopez (Ed.) Proceedings of the Workshop on Critical Information Infrastructures Security
-
Stathopoulos V., Kotzanikolaou P., Magkos E. A framework for secure and verifiable logging in public communication networks. Lecture Notes in Computer Science 2006, vol. 4347:273-284. Springer. J. Lopez (Ed.).
-
(2006)
Lecture Notes in Computer Science
, vol.4347
, pp. 273-284
-
-
Stathopoulos, V.1
Kotzanikolaou, P.2
Magkos, E.3
-
38
-
-
70449635348
-
Secure audit logging with tamper-resistant hardware
-
Kluwer, D. Gritzalis, S.D.C. di Vimercati, P. Samarati, S. Katsikas (Eds.) Security and Privacy in the Age of Uncertainty
-
Chong C., Peng Z., Hartel P. Secure audit logging with tamper-resistant hardware. IFIP Conference Proceedings 2003, vol. 250:73-84. Kluwer. D. Gritzalis, S.D.C. di Vimercati, P. Samarati, S. Katsikas (Eds.).
-
(2003)
IFIP Conference Proceedings
, vol.250
, pp. 73-84
-
-
Chong, C.1
Peng, Z.2
Hartel, P.3
-
39
-
-
84872795246
-
Logcrypt: forward security and public verification for secure audit logs
-
Australian Computer Society, R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, W. Susilo (Eds.) Proceedings of the Australasian Symposium on Grid Computing and e-Research
-
Holt J. Logcrypt: forward security and public verification for secure audit logs. CRIPT 2006, vol. 54:203-211. Australian Computer Society. R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, W. Susilo (Eds.).
-
(2006)
CRIPT
, vol.54
, pp. 203-211
-
-
Holt, J.1
-
41
-
-
34547240272
-
Searchable symmetric encryption: improved definitions and efficient constructions
-
ACM, A. Juels, R. Wright, S.D.C. di Vimercati (Eds.)
-
Curtmola R., Garay J., Kamara S., Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. ACM Conference on Computer and Communications Security 2006, 79-88. ACM. A. Juels, R. Wright, S.D.C. di Vimercati (Eds.).
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
42
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
Boneh D., Franklin M. Identity based encryption from the Weil pairing. SIAM Journal of Computing 2003, 32(3):586-615.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
43
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970, 13(7):422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
44
-
-
84875404012
-
A PKI based secure audit web server
-
IASTED Communications, Network and Information
-
W. Xu, D. Chadwick, S. Otenko, A PKI based secure audit web server, in: IASTED Communications, Network and Information, 2005.
-
(2005)
-
-
Xu, W.1
Chadwick, D.2
Otenko, S.3
-
45
-
-
3042855722
-
Digital logs-proof matters
-
Kenneally E. Digital logs-proof matters. Digital Investigation 2004, 1(2):94-101.
-
(2004)
Digital Investigation
, vol.1
, Issue.2
, pp. 94-101
-
-
Kenneally, E.1
|