搜索结果: 1-8 共查到“军队指挥学 Secure Logging”相关记录8条 . 查询时间(0.069 秒)
We present Steady: an end-to-end secure logging system engineered to be simple in terms of design, implementation, and assumptions for real-world use. Steady gets its name from being based on a steady...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
We present four attacks on three cryptographic schemes intended for securing log files against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by Yavuz et al. (Financi...
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks ...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
secured logging forward security seekability
2016/1/9
Computer log files constitute a precious resource for system administrators for discovering
and comprehending security breaches. A prerequisite of any meaningful log analysis is that
attempts of int...
Practical Secure Logging: Seekable Sequential Key Generators
secure logging forward security
2014/3/12
In computer forensics, log files are indispensable resources that support auditors in identifying and understanding system threats and security breaches. If such logs are recorded locally, i.e., store...
A New Approach to Secure Logging
secure logging MACs signatures forward secure stream integrity
2009/6/4
The need for secure logging is well-understood by the security professionals,
including both researchers and practitioners. The ability to efficiently
verify all (or some) log entries is important t...