Epidemic algorithms for replicated database maintenance
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Coda: A Highly Available File System for a Distributed Workstation Environment
IEEE Transactions on Computers
SDE 5 Proceedings of the fifth ACM SIGSOFT symposium on Software development environments
Human and technical factors of distributed group drawing tools
Interacting with Computers
Dealing with server corruption in weakly consistent, replicated data systems
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Flexible update propagation for weakly consistent replication
Proceedings of the sixteenth ACM symposium on Operating systems principles
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
The IceCube approach to the reconciliation of divergent replicas
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A New Forward-Secure Digital Signature Scheme
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
The Hash History Approach for Reconciling Mutual Inconsistency
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Secrecy, authentication, and public key systems.
Secrecy, authentication, and public key systems.
ACM Computing Surveys (CSUR)
S2d2: a framework for scalable and secure optimistic replication
S2d2: a framework for scalable and secure optimistic replication
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
ACM Transactions on Information and System Security (TISSEC)
Personalizable groupware: accommodating individual roles and group differences
ECSCW'91 Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work
The parting of the ways: divergence, data management and collaborative work
ECSCW'95 Proceedings of the fourth conference on European Conference on Computer-Supported Cooperative Work
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Design and implementation of verifiable audit trails for a versioning file system
FAST '07 Proceedings of the 5th USENIX conference on File and Storage Technologies
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Practical forward secure sequential aggregate signatures
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Proceedings of the 15th ACM conference on Computer and communications security
Providing awareness in multi-synchronous collaboration without compromising privacy
Proceedings of the 2008 ACM conference on Computer supported cooperative work
A new approach to secure logging
ACM Transactions on Storage (TOS)
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
A Commutative Replicated Data Type for Cooperative Editing
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
IMF '09 Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics
Mercurial: The Definitive Guide
Mercurial: The Definitive Guide
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks
IEEE Transactions on Parallel and Distributed Systems
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Depot: Cloud Storage with Minimal Trust
ACM Transactions on Computer Systems (TOCS)
Hi-index | 0.00 |
Within last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These streams of activity are represented by means of logs of operations, i.e. user modifications. A malicious user might tamper his log of operations. At the moment of synchronization with other streams, the tampered log might generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators for authenticating logs that ensure the authenticity, the integrity of logs, and the user accountability. We present algorithms to construct authenticators and verify logs. We prove their correctness and provide theoretical and practical evaluations.