Distributing trust with the Rampart toolkit
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
How to Time-Stamp a Digital Document
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Automatic Event-Stream Notarization Using Digital Signatures
Proceedings of the International Workshop on Security Protocols
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Threshold-based identity recovery for privacy enhanced applications
Proceedings of the 7th ACM conference on Computer and communications security
Secure History Preservation Through Timeline Entanglement
Proceedings of the 11th USENIX Security Symposium
How to Manage Persistent State in DRM Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Journal of Systems Architecture: the EUROMICRO Journal
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Offline architecture for real-time betting
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Portable security transaction protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using assurance models to aid the risk and governance life cycle
BT Technology Journal
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The packet vault: secure storage of network data
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Antiquity: exploiting a secure log for wide-area distributed storage
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
GnatDb: a small-footprint, secure database system
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Strong accountability for network storage
ACM Transactions on Storage (TOS)
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Security analysis of the diebold AccuVote-TS voting machine
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Casting votes in the auditorium
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Practical forward secure sequential aggregate signatures
Proceedings of the 2008 ACM symposium on Information, computer and communications security
MobiRate: making mobile raters stick to their word
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
A New Approach to Secure Logging
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A new approach to secure logging
ACM Transactions on Storage (TOS)
Logging key assurance indicators in business processes
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Multimedia Forensics Is Not Computer Forensics
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
Design and implementation of real-time betting system with offline terminals
Electronic Commerce Research and Applications
Trust-based protection of software component users and designers
iTrust'03 Proceedings of the 1st international conference on Trust management
Forward-security in private-key cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Intrusion-resilient public-key encryption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A multi-core security architecture based on EFI
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Birds of a FETHR: open, decentralized micropublishing
IPTPS'09 Proceedings of the 8th international conference on Peer-to-peer systems
Enabling security in cloud storage SLAs with CloudProof
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
A framework for secure and verifiable logging in public communication networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Proposal of electronic commerce system with cellular phones for digital forensics
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving network flow recording
Digital Investigation: The International Journal of Digital Forensics & Incident Response
An empirical study of automatic event reconstruction systems
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Distributed privacy-preserving transparency logging
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log files. We describe a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to undetectably modify or destroy.