1 |
B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM TISSEC, vol. 2, no. 2, pp.159-176, 1999
DOI
|
2 |
M. Bellare and B. Yee, "Forward integrity for secure audit logs," University of California, San Diego, Dept. of Computer Science & Engineering, Tech. Rep., 1997
|
3 |
J. Kelsey and J. Callas, "Signed syslog messages," IETF Internet Draft, 2005, http://www.ietf.org/internet-drafts/draft-ietf-syslog-sign-16.txt
|
4 |
Computer data logging, http://en.wikipedia.org/wiki/Computer_data_logging
|
5 |
D. Ma and G. Tsudik, "A new approach to secure logging," ACM Trans. on Storage, vol. 5, no. 1, pp. 1-21, 2009.
|
6 |
"인터넷 침해사고 동향 및 분석 월보 200912", 한국인터넷진흥원 인터넷침해대응센터, 2009.
|
7 |
김소이, "전자금융사고 발생유형 및 대응현황", 금융결제원 금융결제연구소 지급결제와 정보기술 제38호, 2009
|