Title :
Consideration about the Preservation Method in the Log Files
Author_Institution :
Dept. of Commercial Sci. Negoyamachi, Takasaki Univ. of Commerce, Takasaki, Japan
Abstract :
In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captured this machine, it should be to guarantee that will gain little or no information from the log files and to limit ability to corrupt the log files. Bruce Schneier and John Kelsey make up for these proposed a secure store system. By the terminal that tolerance is not guaranteed for the takeover-fraud in this secure store system, records the data exchange and operation by the terminal, later protection in order to be able to audit them to ensure, how logging we have proposed some measures approach should be. To reveal the effectiveness and advantages and disadvantages in safely store this system.
Keywords :
"Protocols","Cryptography","Yttrium","Message authentication","Computers","Intrusion detection"
Conference_Titel :
Computer Application Technologies (CCATS), 2015 International Conference on
DOI :
10.1109/CCATS.2015.12