Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Password authentication with insecure communication
Communications of the ACM
Communications of the ACM
Enabling Persistent Service Links
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
Personalization in privacy-aware highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
A survey of key evolving cryptosystems
International Journal of Security and Networks
Digital Evidence: Dream and Reality
IEEE Security and Privacy
A new approach to secure logging
ACM Transactions on Storage (TOS)
Automated Privacy Audits Based on Pruning of Log Data
EDOCW '08 Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops
Logging in the Age of Web Services
IEEE Security and Privacy
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
IMF '09 Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics
A framework for secure and verifiable logging in public communication networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
On fast verification of hash chains
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Delegating secure logging in pervasive computing systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Secure event logging in sensor networks
Computers & Mathematics with Applications
Distributed privacy-preserving transparency logging
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
This paper presents BBox, a digital black box to provide for authentic archiving in distributed systems. Based upon public key cryptography and trusted computing platforms, the BBox employs standard primitives to ensure the authenticity of records during the transmission from devices to the collector, as well as during their storage on the collector and retrieval by auditors. Besides presenting the technical underpinnings of the BBox, this paper demonstrates the authenticity guarantees it ensures and reports on the preliminary deployment figures.