1 |
Chuvakin, A., Schmidt, K., & Phillips, C. (2012). Logging and log management: the authoritative guide to understanding the concepts surrounding logging and log management. Newnes.
|
2 |
Malasri, K., & Wang, L. (2009). Securing wireless implantable devices for healthcare: Ideas and challenges. IEEE Communications Magazine, 47(7), 74-80.
DOI
|
3 |
Gerhards, R. (2009). The syslog protocol. RFC.5424
|
4 |
Bellare, M., & Yee, B. (1997). Forward integrity for secure audit logs (Vol. 184). Technical report, Computer Science and Engineering Department, University of California at San Diego.
|
5 |
Hsu, W. W., & Ong, S. (2007). WORM storage is not enough [Technical Forum]. IBM Systems Journal, 46(2), 363-369.
DOI
|
6 |
강석규, & 박창섭. (2015). 전방 안전성이 보장되는 로그 시스템 보안기법 비교분석. 융합보안논문지, 15(7), 85-96.
|
7 |
강석규, & 박창섭. (2015). 키 지연 노출에 기반을 둔 로그 전송을 고려한 로그 저장 기법. 융합보안논문지, 15(5), 37-45.
|
8 |
Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2 (2), 159-176.
DOI
|
9 |
Ma, D. & Tsudik, G. (2007, May). Forward-secure sequential aggregate authentication. In 2007 IEEE Symposium on Security and Privacy (SP'07) (pp. 86-91). IEEE.
|
10 |
Ma, D. & Tsudik, G. (2009). A new approach to secure logging. ACM Transactions on Storage (TOS), 5(1), 2.
|
11 |
Merkle, R. C. (1989, August). A certified digital signature. In Conference on the Theory and Application of Cryptology (pp. 218-238). Springer New York.
|