Secure Audit Logs to Support Computer Forensics

299Citations
Citations of this article
129Readers
Mendeley users who have this article in their library.

Abstract

In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log files. We describe a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to modify or destroy undetectably. © 1999, ACM. All rights reserved.

References Powered by Scopus

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

12428Citations
N/AReaders
Get full text

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

5225Citations
N/AReaders
Get full text

Keying hash functions for message authentication

1029Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Block-DEF: A secure digital evidence framework using blockchain

322Citations
N/AReaders
Get full text

Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures

220Citations
N/AReaders
Get full text

Keeping Authorities "honest or Bust" with Decentralized Witness Cosigning

195Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Schneier, B., & Kelsey, J. (1999). Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security, 2(2), 159–176. https://doi.org/10.1145/317087.317089

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 65

67%

Researcher 14

14%

Professor / Associate Prof. 11

11%

Lecturer / Post doc 7

7%

Readers' Discipline

Tooltip

Computer Science 97

93%

Engineering 4

4%

Arts and Humanities 2

2%

Design 1

1%

Save time finding and organizing research with Mendeley

Sign up for free