Sciweavers

1186 search results - page 1 / 238
» A New Approach to Secure Logging
Sort
View
DBSEC
2008
89views Database» more  DBSEC 2008»
13 years 6 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
13 years 8 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
DAC
2011
ACM
12 years 4 months ago
Plugging versus logging: a new approach to write buffer management for solid-state disks
Using device write buffers is a promising technique to improve the write performance of solid-state disks. The write buffer not only reduces the write traffic to the flash but als...
Li-Pin Chang, You-Chiuan Su
SADFE
2005
IEEE
13 years 10 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
CCS
2005
ACM
13 years 10 months ago
New approaches for deniable authentication
Mario Di Raimondo, Rosario Gennaro