-
1
-
-
36549089533
-
-
NIST Special Publication 800-92 [Online]. Available
-
K. Kent and M. Souppaya. (1992). Guide to Computer Security Log Management, NIST Special Publication 800-92 [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
-
(1992)
Guide to Computer Security Log Management
-
-
Kent, K.1
Souppaya, M.2
-
2
-
-
84876791665
-
-
U.S. Department of Health and Human Services Sep. [Online] Available
-
U.S. Department of Health and Human Services. (2011, Sep.). HIPAA-General Information [Online]. Available: https://www.cms.gov/hipaageninfo
-
(2011)
HIPAA-General Information
-
-
-
3
-
-
84876784015
-
-
PCI Security Standards Council Sep. Version 1.1 [Online]. Available
-
PCI Security Standards Council. (2006, Sep.) Payment Card Industry (PCI) Data Security Standard-Security Audit Procedures Version 1.1 [Online]. Available: https://www.pcisecuritystandards.org/pdfs/pci?audit?procedures?v1-1. pdf
-
(2006)
Payment Card Industry (PCI) Data Security Standard-Security Audit Procedures
-
-
-
4
-
-
84876807413
-
Sarbanes-Oxley act 2002
-
Sep. [Online] Available
-
Sarbanes-Oxley Act 2002. (2002, Sep.). A Guide to the Sarbanes-Oxley Act [Online]. Available: http://www.soxlaw.com/
-
(2002)
A Guide to the Sarbanes-Oxley Act
-
-
-
7
-
-
0038223020
-
-
Dept. Comput. Sci., Univ. California, San Diego, Tech. Rep Nov
-
M. Bellare and B. S. Yee, "Forward integrity for secure audit logs," Dept. Comput. Sci., Univ. California, San Diego, Tech. Rep., Nov. 1997.
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Bellare, M.1
Yee, B.S.2
-
8
-
-
85057383152
-
-
BalaBit IT Security Sep. [Online] Available
-
BalaBit IT Security (2011, Sep.). Syslog-ng-Multiplatform Syslog Server and Logging Daemon [Online]. Available: http://www.balabit. com/network- security/syslog-ng
-
(2011)
Syslog-ng-Multiplatform Syslog Server and Logging Daemon
-
-
-
9
-
-
84884742409
-
Signed syslog messages
-
Internet Engineering Task Force, Network Working Group, May
-
J. Kelsey, J. Callas, and A. Clemm, Signed Syslog Messages, Request for Comment RFC 5848, Internet Engineering Task Force, Network Working Group, May 2010.
-
(2010)
Request for Comment RFC 5848
-
-
Kelsey, J.1
Callas, J.2
Clemm, A.3
-
10
-
-
65849178422
-
A new approach to secure logging
-
Mar
-
D. Ma and G. Tsudik, "A new approach to secure logging," ACM Trans. Storage, vol. 5, no. 1, pp. 21-221, Mar. 2009.
-
(2009)
ACM Trans. Storage
, vol.5
, Issue.1
, pp. 21-221
-
-
Ma, D.1
Tsudik, G.2
-
11
-
-
84944030615
-
Pseudonymizing unix log file
-
Proc. Int. Conf. Infrastruture Security Oct
-
U. Flegel, "Pseudonymizing unix log file," in Proc. Int. Conf. Infrastruture Security, LNCS 2437. Oct. 2002, pp. 162-179.
-
(2002)
LNCS
, vol.2437
, pp. 162-179
-
-
Flegel, U.1
-
14
-
-
85021950441
-
Security audit logs to support computer forensics
-
May
-
B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159-176, May 1999.
-
(1999)
ACM Trans. Inform. Syst. Security
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
15
-
-
84872795246
-
Logcrypt: Forward security and public verification for secure audit logs
-
J. E. Holt, "Logcrypt: Forward security and public verification for secure audit logs," in Proc. 4th Australasian Inform. Security Workshop, 2006, pp. 203-211.
-
(2006)
Proc. 4th Australasian Inform. Security Workshop
, pp. 203-211
-
-
Holt, J.E.1
-
16
-
-
85084161366
-
Tor: The secondgeneration onion router
-
Aug
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," in Proc. 12th Ann. USENIX Security Symp., Aug. 2004, pp. 21-21.
-
(2004)
Proc. 12th Ann. USENIX Security Symp
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
17
-
-
84870651248
-
-
Inc Sep. Tor: Anonymity Online [Online]. Available
-
The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online [Online]. Available: http://www.torproject.org
-
(2011)
The Tor Project
-
-
-
18
-
-
0020720357
-
On the security of public key protocols
-
Mar
-
D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
19
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0001318089
-
Safeguarding cryptographic keys
-
Jun
-
G. R. Blakley, "Safeguarding cryptographic keys," in Proc. Nat. Comput. Conf., Jun. 1979, p. 313.
-
(1979)
Proc. Nat. Comput. Conf
, pp. 313
-
-
Blakley, G.R.1
-
22
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Aug
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage," in Proc. 15th Ann. Int. Cryptology Conf., Aug. 1995, pp. 339-352.
-
(1995)
Proc. 15th Ann. Int. Cryptology Conf
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
23
-
-
35048839792
-
K-times anonymous authentication (extended abstract)
-
I. Teranishi, J. Furukawa, and K. Sako, "k-times anonymous authentication (extended abstract)," in Proc. 10th Int. Conf. Theor. Appl. Cryptology Inform. Security, LNCS 3329. 2004, pp. 308-322. (Pubitemid 39747762)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
24
-
-
0038164341
-
Architecture of an open object-oriented database management system
-
Oct
-
D. L. Wells, J. A. Blakeley, and C. W. Thompson, "Architecture of an open object-oriented database management system," IEEE Comput., vol. 25, no. 10, pp. 74-82, Oct. 1992.
-
(1992)
IEEE Comput
, vol.25
, Issue.10
, pp. 74-82
-
-
Wells, D.L.1
Blakeley, J.A.2
Thompson, C.W.3
-
25
-
-
17044406146
-
Concurrency control in distributed object oriented database systems
-
Sep
-
K. Nørv°ag, O. Sandst°a, and K. Bratbergsengen, "Concurrency control in distributed object oriented database systems," in Proc. 1st East-Eur. Symp. Adv. Databases Inform. Syst., Sep. 1997, pp. 32-32.
-
(1997)
Proc. 1st East-Eur. Symp. Adv. Databases Inform. Syst
, pp. 32-32
-
-
Nørvag, K.1
Sandsta, O.2
Bratbergsengen, K.3
-
27
-
-
84876785400
-
-
Project: AN.ON-Anonymity Online Mar. [Online]. Available
-
Project: AN.ON-Anonymity Online. (2012, Mar.). JAP Anonymity and Privacy [Online]. Available: http://anon.inf.tu-dresden.de/index?en.html
-
(2012)
JAP Anonymity and Privacy
-
-
-
28
-
-
84876809433
-
-
Ultrareach Internet Corporation Mar. Freedom [Online] Available
-
Ultrareach Internet Corporation. (2012, Mar.). Ultrasurf-Privacy, Security, Freedom [Online]. Available: http://ultrasurf.us/index.html
-
(2012)
Ultrasurf-Privacy Security
-
-
-
29
-
-
84876790911
-
-
Mar. FreeGate [Online]. Available
-
Global Internet Freedom Consortium. (2012, Mar.). FreeGate [Online]. Available: http://www.internetfreedom.org/FreeGate
-
(2012)
Global Internet Freedom Consortium
-
-
|