作者: Michael K. Reiter , Fabian Monrosel , Darren Davisl
DOI:
关键词: Authentication 、 Computer science 、 Audit 、 Encryption 、 Database 、 Delegation 、 Delegate
摘要: In this paper we explore restricted delegation of searches on encrypted audit logs. We show how to limit the exposure private infor- mation stored in log during such a search and provide technique delegate an investigator. These delegated are limited authorized keywords that pertain specific time periods, guarantees completeness Moreover, investigators can efficiently find all relevant records, authenticate retrieved records without interacting with owner log. addition, empirical evaluation our techniques using logs consisting approximately 27, 000 IDS alerts collected over span few months.