搜索结果: 1-7 共查到“军事学 Audit”相关记录7条 . 查询时间(0.031 秒)
Log files are the primary source of information when the
past operation of a computing system needs to be determined. Keeping
correct and accurate log files is important for after-the-fact forensics...
Efficient Record-Level Keyless Signatures for Audit Logs
applied security secure logging keyless signatures
2016/1/8
We propose a log signing scheme that enables (a) verification of the integrity of the whole log, and
(b) presentation of any record, along with a compact proof that the record has not been altered si...
Experiments in Encrypted and Searchable Network Audit Logs
network telemetry identity based encryption audit log privacy
2016/1/5
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. E...
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Data confidentiality multi-tenancy audit-trail log
2015/12/18
Cloud computing is delivery of services rather
than a product and among different cloud deployment models,
the public cloud provides improved scalability and cost reduction
when compared to others....
Privacy-Preserving Audit and Extraction of Digital Contents
Privacy-Preserving Audit Digital Contents
2009/6/4
A growing number of online services, such as Google, Yahoo!, and Amazon, are starting to
charge users for their storage. Customers often use these services to store valuable data such as
email, fami...
Universally Composable Time-Stamping Schemes with Audit
Time-Stamping Provable Security One-Way Hash Functions Universal Composability
2009/2/16
We present a universally composable time-stamping scheme based on universal one-way hash functions.The model we use contains an ideal auditing functionality (implementable in the Common Reference Str...
Logcrypt:Forward Security and Public Verification for Secure Audit Logs
Logcrypt Forward Security Public Verification Secure Audit Logs
2009/1/12
Logcrypt provides strong cryptographic assurances
that data stored by a logging facility before a system
compromise cannot be modified after the compromise
without detection. We build on prior work...