Security information in production and operations: a study on audit trails in database systems
暂无分享,去创建一个
[1] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[2] Giuseppe Ateniese,et al. Verifiable audit trails for a versioning file system , 2005, StorageSS '05.
[3] David L. Sallach,et al. A deductive database audit trail , 1992, SAC '92.
[4] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[5] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Komal Kumar Bhatia,et al. Functionality and Security Analysis of ORACLE, IBM-DB2 & SQL Server , 2010 .
[8] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[9] Ramez Elmasri,et al. Fundamentals of database systems (2nd ed.) , 1994 .