Sciweavers

RAID
1999
Springer

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

13 years 8 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.
John Kelsey, Bruce Schneier
Added 04 Aug 2010
Updated 04 Aug 2010
Type Conference
Year 1999
Where RAID
Authors John Kelsey, Bruce Schneier
Comments (0)