Anonymizing log management process for secure logging in the cloud
暂无分享,去创建一个
[1] Kashif Munir,et al. FRAMEWORK FOR SECURE CLOUD COMPUTING , 2013, CloudCom 2013.
[2] S. Vidya,et al. Secured Personal Health Records Transactions Using Homomorphic Encryption In Cloud Computing , 2012 .
[3] Ahmed E. Youssef,et al. A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .
[4] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[5] Bernie Lantz,et al. LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES , 2006 .
[6] Jennifer Neville,et al. Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems , 2012, NSDI.
[7] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[8] Indrajit Ray,et al. Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.
[9] Noorul Islam,et al. IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES , 2015 .
[10] Mohamed Saleh,et al. Analyzing multiple logs for forensic evidence , 2007, Digit. Investig..
[11] H. Shigeno,et al. A secure logging scheme for Forensic Computing , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..