Verifiable redactable audit log

作者: Ryan Castellucci , Philip Martin

DOI:

关键词:

摘要: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry order to sever confidentiality of a log from verifiability. Logs be verified using recalculation hashes and verification trusted digital signatures. In the divided into segments, each signed by time server or self-signed system ephemeral keys. messages regarding specific objects events nested within prevent reporting omission. The logging receive enter log.

参考文章(138)
Diana K. Smetters, Brent R. Waters, Dirk Balfanz, Glenn Durfee, Building an Encrypted and Searchable Audit Log. network and distributed system security symposium. ,(2004)
Scott A. Crosby, Dan S. Wallach, Efficient data structures for tamper-evident logging usenix security symposium. pp. 317- 334 ,(2009)
Brian Oberholtzer, Michael Lutz, Software test and performance monitoring system ,(2005)
Cory H. Siddens, B. Scott Boding, Fraud detection system audit capability ,(2012)
Daniel Bretoi, Stephen Nelson, George Wu, Girish Vaitheeswaran, Sapan Panigrahi, Executing software performance test jobs in a clustered system ,(2008)
Patrick Audley, John Bradley, Martin Renaud, Globally aware authentication system ,(2007)