1 |
D. Ma and G. Tsudik, "A new approach to secure logging," ACM Trans. on Storage, Vol.5, No.1, pp.1-21, 2009.
|
2 |
Weon Shin, "A Secure Logging for Collection of Digital Evidences", Journal of the Korea Institute of Marine Information & Communication Sciences, Vol.14, No.7, pp.1610-1616, 2010.
DOI
ScienceOn
|
3 |
M. Bellare and B. Yee, "Forward integrity for secure audit logs," University of California, San Diego, Dept. of Computer Science & Engineering, Tech. Rep., 1997.
|
4 |
"Korea Internet White Paper", Korea Internet & Security Agency, 2011.
|
5 |
"Korea Internet Incident Trend Report, December 2011", Korea Internet & Security Agency KrCERT/CC, 2011.
|
6 |
Digital forensics, http://en.wikipedia.org/wiki/Digital_forensics
|
7 |
Computer data logging, http://en.wikipedia.org/wiki/Computer_data_logging
|
8 |
J. Kelsey and J. Callas, "Signed syslog messages," IETF Internet Draft, 2005, http://www.ietf.org/internet-drafts/draft-ietfsyslog-sign-16.txt
|
9 |
B. Schneier and J. Kelsey, "Security audit logs to support computer forensics," ACM TISSEC, Vol.2, No.2, pp.159-176, 1999.
DOI
|