A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
An Economy-based Accounting Infrastructure for the DataGrid
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Towards secure Grid-enabled healthcare: Research Articles
Software—Practice & Experience - Grid Security
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
The monitorability of service-level agreements for application-service provision
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
FLAIM: a multi-level anonymization framework for computer and network logs
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Practical Techniques for Operating System Attestation
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Trusted Logging for Grid Computing
APTC '08 Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
Distributed general logging architecture for grid environments
VECPAR'06 Proceedings of the 7th international conference on High performance computing for computational science
Managing application whitelists in trusted distributed systems
Future Generation Computer Systems
Scalable remote attestation with privacy protection
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Ensuring continuous compliance through reconciling policy with usage
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
Secure management of logs in an organisational grid environment is often considered a task of low priority. However, it must be rapidly upgraded when the logs have security properties in their own right. We present several use cases where log integrity and confidentiality are essential, and propose a log reconciliation architecture in which both are ensured. We use a combination of trusted computing and virtualization to enable blind log analysis , allowing users to see the results of legitimate queries, while still withholding access to privileged raw data.