Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges

被引:26
作者
Accorsi, Rafael [1 ]
机构
[1] Univ Freiburg, Dept Telemat, D-7800 Freiburg, Germany
来源
IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC | 2009年
关键词
Digital evidence; Preservation; Secure logging protocols; Legal and security requirements; PRIVACY;
D O I
10.1109/IMF.2009.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While log data are being increasingly used as digital evidence in court, the extent which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. This paper elucidates a subset of the necessary secure requirements for digital evidence and extensively surveys the state of the art secure logging protocols, thereby demonstrating that none of the current protocols completely fulfills the elucidated requirements for admissible evidence. In analyzing the shortcoming of logging protocols, the paper also elaborates on the related research challenges.
引用
收藏
页码:94 / 110
页数:17
相关论文
共 43 条
[1]  
ACCORSI R, 2008, THESIS U FREIBURG
[2]  
Accorsi R, 2009, LNI, P223
[3]  
Accorsi R, 2006, INT FED INFO PROC, V201, P329
[4]  
Accorsi R, 2006, LECT NOTES COMPUT SC, V3934, P58
[5]  
Alles M., 2003, Information Systems Control Journal, V1
[6]  
[Anonymous], 2006, ACM CCS 2006
[7]  
[Anonymous], 1997, Technical Report
[8]  
[Anonymous], NETW DISTR SYST SEC
[9]   A Formal Language for Cryptographic Pseudocode [J].
Backes, Michael ;
Berg, Matthias ;
Unruh, Dominique .
LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2008, 5330 :353-376
[10]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&