Secured Temporal Log Management Techniques for Cloud
暂无分享,去创建一个
M. Vijayalakshmi | Arputharaj Kannan | S. Muthurajkumar | S. Ganapathy | A. Kannan | S. Ganapathy | S. Muthurajkumar | M. Vijayalakshmi
[1] Indrajit Ray,et al. Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[5] Dong Hoon Lee,et al. Strong Diffie-Hellman-DSA Key Exchange , 2007, IEEE Communications Letters.
[6] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[7] Gene Tsudik,et al. A new approach to secure logging , 2008, TOS.
[8] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.