Sciweavers

Share
SEC
2003

Secure Audit Logging with Tamper-Resistant Hardware

9 years 3 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user’s actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey’s secure audit logging protocol [1], strengthening the protocol by using tamper-resistant hardware (an iButton) in two ways: Firstly our implementation of the protocol works offline as well as online. Secondly, we use unforgeable time stamps to increase the possibilities of fraud detection. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
Added 01 Nov 2010
Updated 01 Nov 2010
Type Conference
Year 2003
Where SEC
Authors Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
Comments (0)
books