Table of Contents
Securing Network Audit Logs on Untrusted Machines
WHAT’S THE PROBLEM?
WHAT’S THE SOLUTION?
MORE INVOLVED STATEMENT OF THE PROBLEM
WHAT WE WANT
LIMITS ON THE USEFUL SOLUTIONS
A Description of Our Method
3. Each log entry contains an element in a hash chain that serves to authenticate the values of the previous log entries.
Protocols in the Paper
Cross Peer Linkages: Building a Hash Lattice
Replacing T with a Network of Insecure Peers
Full paper can be found at:http://www.counterpane.com/secure-logs.html
|Author: Bruce Schneier|