Secure audit logs with verifiable excerpts

10Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Log files are the primary source of information when the past operation of a computing system needs to be determined. Keeping correct and accurate log files is important for after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.

Cite

CITATION STYLE

APA

Hartung, G. (2016). Secure audit logs with verifiable excerpts. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9610, pp. 183–199). Springer Verlag. https://doi.org/10.1007/978-3-319-29485-8_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free