Loading...
Please wait, while we are loading the content...
Similar Documents
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs (1999)
| Content Provider | CiteSeerX |
|---|---|
| Author | Kelsey, John Schneier, Bruce |
| Description | Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments. |
| File Format | |
| Language | English |
| Publisher Date | 1999-01-01 |
| Publisher Institution | Recent Advances in Intrusion Detection |
| Access Restriction | Open |
| Subject Keyword | Essential Tool Cryptographically Protected Audit Log Low-bandwidth Environment Information Exchange Audit Log Computer Forensics Remote Access Tamperproof Audit Log Audit-log Verification |
| Content Type | Text |
| Resource Type | Article |