Title :
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Author_Institution :
Dep. of Telematics, Univ. of Freiburg, Freiburg, Germany
Abstract :
While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. We elucidate the necessary secure requirements for digital evidence and extensively survey the state of the art secure logging protocols,thereby demonstrating that none of the current proposals fulfills the necessary conditions for admissible evidence.
Keywords :
security of data; system monitoring; digital evidence; log data; secure logging protocol; secure requirements; Computer applications; Computer security; Cryptographic protocols; Cryptography; Data security; Law; Legal factors; Proposals; Protection; Protective relaying; Digital Evidence; Forensics; Secure Logging;
Conference_Titel :
Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International
Conference_Location :
Seattle, WA
Print_ISBN :
978-0-7695-3726-9
DOI :
10.1109/COMPSAC.2009.166