Securing Network Audit Logs on Untrusted Machines

12/1/98


Click here to start


Table of Contents

Securing Network Audit Logs on Untrusted Machines

WHAT’S THE PROBLEM?

WHAT’S THE SOLUTION?

MORE INVOLVED STATEMENT OF THE PROBLEM

WHAT WE WANT

APPLICATIONS

LIMITS ON THE USEFUL SOLUTIONS

A Description of Our Method

3. Each log entry contains an element in a hash chain that serves to authenticate the values of the previous log entries.

Protocols in the Paper

Cross Peer Linkages: Building a Hash Lattice

Replacing T with a Network of Insecure Peers

Conclusions

Full paper can be found at: http://www.counterpane.com/secure-logs.html

Author: Bruce Schneier