-
3
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G.W., King, S.T., Cinar, S., Basrai, M., Chen, P.M.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In: In Proc. 2002 Symp. Operating Sys. Design and Implementation. (2002)
-
(2002)
Proc. 2002 Symp. Operating Sys. Design and Implementation.
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
4
-
-
0038223020
-
Forward integrity for secure audit logs
-
Computer Science and Engineering Department, University of California at San Diego
-
Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of California at San Diego (1997)
-
(1997)
Technical Report
-
-
Bellare, M.1
Yee, B.2
-
6
-
-
85028754690
-
How to time-stamp a digital document
-
In Menezes, A., Vanstone, S.A., eds.: Springer-Verlag
-
Haber, S., Stornetta, W.: How to time-stamp a digital document. In Menezes, A., Vanstone, S.A., eds.: Proc. of CRYPTO'90. Volume 537 of Lecture Notes in Computer Science., Springer-Verlag (1990) 437-455
-
(1990)
Proc. of CRYPTO'90. Volume 537 of Lecture Notes in Computer Science.
, pp. 437-455
-
-
Haber, S.1
Stornetta, W.2
-
7
-
-
50349097669
-
Secure audit logging with tamperresistant hardware
-
Universiteit Twente, Enschede, The Netherlands
-
Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamperresistant hardware. Tech. Rep., Universiteit Twente, Enschede, The Netherlands (2002)
-
(2002)
Tech. Rep.
-
-
Chong, C.N.1
Peng, Z.2
Hartel, P.H.3
-
8
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: The 11th Annual Network and Distributed System Security Symposium. (2004)
-
(2004)
The 11th Annual Network and Distributed System Security Symposium
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
9
-
-
33748570319
-
On the relationship of privacy and secure remote logging in dynamic systems
-
Springer-Verlag
-
Accorsi, R.: On the relationship of privacy and secure remote logging in dynamic systems. In: Security and Privacy in Dynamic Environments. Volume 201., Springer-Verlag (2006) 329-338
-
(2006)
Security and Privacy in Dynamic Environments.
, vol.201
, pp. 329-338
-
-
Accorsi, R.1
-
10
-
-
49049113356
-
Logcrypt: Forward security and public verification for secure audit logs
-
Holt, J.: Logcrypt: Forward security and public verification for secure audit logs. In: Proc. of Australasian Information Security Workshop. (2006)
-
(2006)
Proc. of Australasian Information Security Workshop
-
-
Holt, J.1
-
11
-
-
33745455663
-
Efficient log authentication for forensic computing
-
IEEE
-
Kawaguchi, N., Obata, N., Ueda, S., Azuma, Y., Shigeno, H., Okada, K.: Efficient log authentication for forensic computing. In: In Proc Of IEEE 6th Information Assurance Workshop, IEEE (2005) 215-223
-
(2005)
Proc of IEEE 6th Information Assurance Workshop
, pp. 215-223
-
-
Kawaguchi, N.1
Obata, N.2
Ueda, S.3
Azuma, Y.4
Shigeno, H.5
Okada, K.6
|