Logging Integrity with Blockchain Structures
暂无分享,去创建一个
[1] Shahriar Akter,et al. mHealth Technologies for Chronic Diseases and Elders: A Systematic Review , 2013, IEEE Journal on Selected Areas in Communications.
[2] Michael Rigby,et al. Integrating Health and Social Care Informatics to Enable Holistic Health Care , 2012, pHealth.
[3] Chung-Yi Lin,et al. Secure logging framework integrating with cloud database , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[4] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[5] Dan Meng,et al. Efficient tamper-evident logging of distributed systems via concurrent authenticated tree , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[6] Laurie A. Williams,et al. Log your CRUD: design principles for software logging mechanisms , 2014, HotSoS '14.
[7] Douglas C. Schmidt,et al. FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data , 2018, Computational and structural biotechnology journal.
[8] Yu Luo,et al. The Game of Twenty Questions: Do You Know Where to Log? , 2017, HotOS.
[9] Masaru Okumura,et al. Constructing a Log Collecting System using Splunk and its Application for Service Support , 2016, SIGUCCS.
[10] Kaichuang Yang. Aggregated Containerized Logging Solution with Fluentd, Elasticsearch and Kibana , 2016 .
[11] Maria Hägglund,et al. Studying Intersection Points - An Analysis of Information Needs for Shared Homecare of Elderly Patients , 2009 .
[12] Kamalanathan Kandasamy,et al. Profiling SIEM tools and correlation engines for security analytics , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[13] Roberto Baldoni,et al. A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database , 2017, 2017 13th European Dependable Computing Conference (EDCC).
[14] J. Ramya Rajalakshmi,et al. Anonymizing log management process for secure logging in the cloud , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].
[15] Gunnar Hartung,et al. Secure Audit Logs with Verifiable Excerpts , 2016, CT-RSA.
[16] Taghreed Adam,et al. The burden and costs of chronic diseases in low-income and middle-income countries , 2007, The Lancet.
[17] Gábor Magyar,et al. Blockchain: Solving the privacy and research availability tradeoff for EHR data: A new disruptive technology in health data management , 2017, 2017 IEEE 30th Neumann Colloquium (NC).
[18] Niels Boye,et al. Co-production of Health Enabled by Next Generation Personal Health Systems , 2012, pHealth.
[19] Marjan Mernik,et al. FAL: A forensics aware language for secure logging , 2013, 2013 Federated Conference on Computer Science and Information Systems.