Architecture v2, 2007. ,
Logcrypt: forward security and public verification for secure audit logs, Proceedings of the 2006 Australasian workshops on Grid computing and e-research - of ACM International Conference Proceeding Series, pp.203-211, 2006. ,
A new approach to secure logging, ACM Transactions on Storage (TOS), vol.5, issue.1, 2009. ,
Personalization in privacy-aware highly dynamic systems, Communications of the ACM, vol.49, issue.9, 2006. ,
DOI : 10.1145/1151030.1151052
Cryptographic support for secure logs on untrusted machines, The Seventh USENIX Security Symposium Proceedings, USENIX Press, pp.53-62, 1998. ,
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services and Identity Management, 2006. ,
Secure and Privacy-Friendly Logging for eGovernment Services, 2008 Third International Conference on Availability, Reliability and Security, pp.1091-1096, 2008. ,
DOI : 10.1109/ARES.2008.41