M. Casassa-mont, S. Crosta, T. Kriegelstein, and D. Sommer, Architecture v2, 2007.

J. E. Holt, Logcrypt: forward security and public verification for secure audit logs, Proceedings of the 2006 Australasian workshops on Grid computing and e-research - of ACM International Conference Proceeding Series, pp.203-211, 2006.

D. Ma and G. Tsudik, A new approach to secure logging, ACM Transactions on Storage (TOS), vol.5, issue.1, 2009.

S. Sackmann, J. Strüker, and R. Accorsi, Personalization in privacy-aware highly dynamic systems, Communications of the ACM, vol.49, issue.9, 2006.
DOI : 10.1145/1151030.1151052

B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, The Seventh USENIX Security Symposium Proceedings, USENIX Press, pp.53-62, 1998.

C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services and Identity Management, 2006.

K. Wouters, K. Simoens, D. Lathouwers, and B. Preneel, Secure and Privacy-Friendly Logging for eGovernment Services, 2008 Third International Conference on Availability, Reliability and Security, pp.1091-1096, 2008.
DOI : 10.1109/ARES.2008.41