Logging key assurance indicators in business processes
暂无分享,去创建一个
[1] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[2] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[3] Bruce Schneier,et al. Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs , 1999, Recent Advances in Intrusion Detection.
[4] Bruce Schneier,et al. Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.
[5] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[6] Gene Tsudik,et al. A new approach to secure logging , 2008, TOS.
[7] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[8] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[9] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.