Sciweavers

RAID
1999
Springer

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

13 years 10 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.
John Kelsey, Bruce Schneier
Added 04 Aug 2010
Updated 04 Aug 2010
Type Conference
Year 1999
Where RAID
Authors John Kelsey, Bruce Schneier
Comments (0)