Delegating secure logging in pervasive computing systems

被引:0
|
作者
Accorsi, Rafael [1 ]
Hohl, Adolf [1 ]
机构
[1] Univ Freiburg, Dept Telemat, Freiburg, Germany
来源
SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS | 2006年 / 3934卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors. Second, we investigate the question of how to securely delegate our logging protocol to a relay equipped with trusted-computing modules.
引用
收藏
页码:58 / 72
页数:15
相关论文
共 50 条
  • [1] Secure Logging As a Service-Delegating Log Management to the Cloud
    Ray, Indrajit
    Belyaev, Kirill
    Strizhov, Mikhail
    Mulamba, Dieudonne
    Rajaram, Mariappan
    IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 323 - 334
  • [2] Secure multi-mode systems and their applications for pervasive computing
    Park, Jong Hyuk
    Chen, Hsiao-Hwa
    Coronato, Antonio
    Kortuem, Gerd
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4232 - 4233
  • [3] A secure logging scheme for forensic computing
    Kawaguchi, N
    Ueda, S
    Obata, N
    Miyaji, R
    Kaneko, S
    Shigeno, H
    Okada, K
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 386 - 393
  • [4] Towards the modelling of secure pervasive computing systems: A paradigm of Context-Aware Secure Action System
    Siewe, Francois
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016, 87 : 121 - 144
  • [5] Secure lightweight cryptosystem for IoT and pervasive computing
    Abutaha, Mohammed
    Atawneh, Basil
    Hammouri, Layla
    Kaddoum, Georges
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [6] Secure lightweight cryptosystem for IoT and pervasive computing
    Mohammed Abutaha
    Basil Atawneh
    Layla Hammouri
    Georges Kaddoum
    Scientific Reports, 12
  • [7] A Secure Framework for Location Verification in Pervasive Computing
    Liu, Dawei
    Lee, Moon-Chuen
    Wu, Dan
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 388 - 397
  • [8] From Pervasive Computing to Pervasive Information Systems
    Guadarrama-Sanchez, Hugo Alberto
    INVESTIGACION BIBLIOTECOLOGICA, 2024, 38 (99): : 35 - 54
  • [10] Systems directions for pervasive computing
    Grimm, R
    Davis, J
    Hendrickson, B
    Lemar, E
    MacBeth, A
    Swanson, S
    Anderson, T
    Bershad, B
    Borriello, G
    Gribble, S
    Wetherall, D
    EIGHTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, 2001, : 147 - 151