Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
J. Kelsey and B. Schneier
Second International Workshop on the Recent Advances in Intrusion Detection (RAID '99), September 1999.
ABSTRACT: Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..