메뉴 건너뛰기




Volumn , Issue , 2013, Pages 219-230

SecLaaS: Secure logging-as-a-service for cloud forensics

Author keywords

cloud forensics; cloud security; forensic investigation; logging as a service

Indexed keywords

CLOUD COMPUTING ARCHITECTURES; CLOUD FORENSICS; CLOUD INFRASTRUCTURES; CLOUD MANAGEMENTS; CLOUD SECURITIES; COMPUTING PARADIGM; FORENSIC INVESTIGATION; LOGGING-AS-A-SERVICE;

EID: 84877990370     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484342     Document Type: Conference Paper
Times cited : (136)

References (32)
  • 1
    • 33748570319 scopus 로고    scopus 로고
    • On the relationship of privacy and secure remote logging in dynamic systems
    • Springer US
    • R. Accorsi. On the relationship of privacy and secure remote logging in dynamic systems. In Security and Privacy in Dynamic Environments, volume 201, pages 329-339. Springer US, 2006.
    • (2006) Security and Privacy in Dynamic Environments , vol.201 , pp. 329-339
    • Accorsi, R.1
  • 2
    • 84877971059 scopus 로고    scopus 로고
    • Accessed July 5th, 2012
    • Amazon. Zeus botnet controller. http://aws.amazon.com/security/security- bulletins/zeus-botnet-controller/. [Accessed July 5th, 2012].
    • Zeus Botnet Controller
  • 3
    • 84870752574 scopus 로고    scopus 로고
    • Accessed July 5th, 2012
    • AWS. Amazon web services. http://aws.amazon.com. [Accessed July 5th, 2012].
    • Amazon Web Services
  • 4
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • Springer
    • J. Benaloh and M. De Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in CryptologyâǍ EUROCRYPTâǍŹ93, pages 274-285. Springer, 1994.
    • (1994) Advances in CryptologyâǍEUROCRYPTâǍŹ93 , pp. 274-285
    • Benaloh, J.1    De Mare, M.2
  • 6
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 8
    • 84878003506 scopus 로고    scopus 로고
    • Accessed July 5th, 2012
    • Clavister. Security in the cloud. http://www.clavister.com/documents/ resources/white-papers/clavister-whp-security-in-the-cloud-gb.pdf. [Accessed July 5th, 2012].
    • Security in the Cloud
  • 9
    • 84877940106 scopus 로고    scopus 로고
    • Congress of the United States. Accessed July 5th, 2012
    • Congress of the United States. Sarbanes-Oxley Act. http://thomas.loc.gov, 2002. [Accessed July 5th, 2012].
    • (2002) Sarbanes-Oxley Act
  • 10
    • 84881036300 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
    • J. Dykstra and A. Sherman. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. DoD Cyber Crime Conference, January 2012.
    • DoD Cyber Crime Conference, January 2012
    • Dykstra, J.1    Sherman, A.2
  • 11
    • 84877958375 scopus 로고    scopus 로고
    • FBI. 2008 Regional Computer Forensics Laboratory Program, Accessed July 5th, 2012
    • FBI. Annualreport for fiscal year 2007. 2008 Regional Computer Forensics Laboratory Program, 2008. [Accessed July 5th, 2012].
    • (2008) Annualreport for Fiscal Year 2007
  • 13
    • 84945279475 scopus 로고    scopus 로고
    • An efficient dynamic and distributed cryptographic accumulator
    • M. Goodrich, R. Tamassia, and J. Hasić. An efficient dynamic and distributed cryptographic accumulator. Information Security, pages 372-388, 2002.
    • (2002) Information Security , pp. 372-388
    • Goodrich, M.1    Tamassia, R.2    Hasić, J.3
  • 19
    • 65849178422 scopus 로고    scopus 로고
    • A new approach to secure logging
    • Mar.
    • D. Ma and G. Tsudik. A new approach to secure logging. Trans. Storage, 5(1):2:1-2:21, Mar. 2009.
    • (2009) Trans. Storage , vol.5 , Issue.1
    • Ma, D.1    Tsudik, G.2
  • 20
    • 84877993352 scopus 로고    scopus 로고
    • Accessed July 5th, 2012
    • Market Research Media. Global cloud computing market forecast 2015-2020. http://www.marketresearchmedia.com/2012/01/08/global-cloud-computing-market/. [Accessed July 5th, 2012].
    • Global Cloud Computing Market Forecast 2015-2020
  • 24
    • 84877974088 scopus 로고    scopus 로고
    • An explanation of computer forensics
    • J. Robbins. An explanation of computer forensics. National Forensics Center, 774:10-143, 2008.
    • (2008) National Forensics Center , vol.774 , pp. 10-143
    • Robbins, J.1
  • 26
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • May
    • B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159-176, May 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 31
    • 77950845927 scopus 로고    scopus 로고
    • Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems
    • dec.
    • A. Yavuz and P. Ning. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In Computer Security Applications Conference, 2009. ACSAC '09. Annual, pages 219-228, dec. 2009.
    • (2009) Computer Security Applications Conference, 2009. ACSAC '09. Annual , pp. 219-228
    • Yavuz, A.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.