Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where an attacker has broken into the system. A relatively recent feature of these schemes is resistance against truncations, i.e. the deletion and/or replacement of the end of the log file. This is especially relevant as system intruders are typically interested in manipulating the later log entries that point towards their attack. However, there are not many schemes that are resistant against truncating the log file. Those that are have at least one of the following disadvantages: They are memory intensive (they store at least one signature per l...
The Twelfth International Workshop on Collaborative Editing Systems, CSCW'12International audienceIn...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Logging is a key mechanism in the security of computer systems. Beyond supporting important forwar...
It is common today in large corporate environments for system administrators to employ centralized s...
Audit logs are an elemental part of computer systems due to their forensic value. Safeguarding audit...
An audit log enables us to discover malfeasance in a system and to understand a security breach afte...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
Log files provide essential information regarding the actions of processes in critical computer sys...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Retrospective security has become increasingly important to the theory and practice of cyber securit...
<p>Auditing system logs is an important means of ensuring systems' security in situations where run-...
The Twelfth International Workshop on Collaborative Editing Systems, CSCW'12International audienceIn...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Logging is a key mechanism in the security of computer systems. Beyond supporting important forwar...
It is common today in large corporate environments for system administrators to employ centralized s...
Audit logs are an elemental part of computer systems due to their forensic value. Safeguarding audit...
An audit log enables us to discover malfeasance in a system and to understand a security breach afte...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
Log files provide essential information regarding the actions of processes in critical computer sys...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Retrospective security has become increasingly important to the theory and practice of cyber securit...
<p>Auditing system logs is an important means of ensuring systems' security in situations where run-...
The Twelfth International Workshop on Collaborative Editing Systems, CSCW'12International audienceIn...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...