Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.

作者: Bruce Schneier , John Kelsey

DOI:

关键词:

摘要: Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof log where amount of information exchange required verify entries is greatly reduced. By making audit-log verification more efficient, this system suitable implementation low-bandwidth environments.

参考文章(3)
Stuart Haber, W. Scott Stornetta, How to time-stamp a digital document Journal of Cryptology. ,vol. 3, pp. 99- 111 ,(1991) , 10.1007/BF00196791
Bruce Schneier, John Kelsey, Cryptographic support for secure logs on untrusted machines usenix security symposium. pp. 4- 4 ,(1998)
Bruce Schneier, John Kelsey, Automatic Event-Stream Notarization Using Digital Signatures international workshop on security. pp. 155- 169 ,(1996) , 10.1007/3-540-62494-5_15