搜索结果: 1-15 共查到“Logging”相关记录44条 . 查询时间(0.062 秒)
SELL v1.0: Searchable Encrypted Logging Library
Secure logging dynamic searchable symmetric encryption privacy-preserving
2019/4/16
We present a practical solution to design a secure logging system that provides confidentiality, integrity, completeness, and non-repudiation. To the best of our knowledge, our solution is the first p...
We present Steady: an end-to-end secure logging system engineered to be simple in terms of design, implementation, and assumptions for real-world use. Steady gets its name from being based on a steady...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
Impact of logging intensity on stem density, basal area and biodiversity indices five years after logging in a Caspian hardwood forest
harvesting intensity forest biodiversity northern Iran
2017/6/26
The aim of the present study was to analyse the impacts of different logging intensities after five years from logging including non-logged, low (3.4 felled stems per hectare), medium (5.2 felled stem...
We present four attacks on three cryptographic schemes intended for securing log files against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by Yavuz et al. (Financi...
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks ...
Operator's physical workload in simulated logging and timber bucking by harvester
forest harvesting biofeedback ergonomics
2016/6/3
The aim is to conduct experimental measurements and analyses of physical and mental workload of harvester operators. Among other things, monitoring and analyses of work conditions and workload help re...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
secured logging forward security seekability
2016/1/9
Computer log files constitute a precious resource for system administrators for discovering
and comprehending security breaches. A prerequisite of any meaningful log analysis is that
attempts of int...
Insynd: Privacy-Preserving Transparency Logging Using Balloons
cryptographic protocols secure logging
2016/1/4
Insynd is a cryptographic scheme for privacy-preserving transparency logging. In the setting of transparency logging, a service provider continuously logs descriptions of its data processing on its us...
The 3D Photo-Logging System for Easy and Effective Recording and Understanding of Archaeological Sites
Camera phone 3D viewpoint GPS motion sensor photograph documentation
2015/11/12
A “3D photo-logging system,” a new method for recording archaeological sites, was developed. The prototype system consists of several servers running on a single machine and logging units composed of ...
Slim hole logging in shallow boreholes
environmental logging subsurface porosity elastic parameters hydraulic parameters
2015/9/29
While well logging, a continuous recording of the physical parameters down a borehole, is employed systematically in petroleum exploration, its application in environmental prospections, such as hydro...
The occurrence of early-arriving saproxylic beetles on Scots pine logging residues generated by thinning
bark- and wood-boring beetle branch felling date pest Pinus sylvestris treetop
2015/8/27
The occurrences of early-arriving saproxylic beetles were examined on 1,200 fragments of Scots pine (Pinus sylvestris L.) logging residues generated by thinning in a single stand in the Drahanská High...
Energy yield of logging residues of the south-eastern region of the Czech Republic
wood chips renewable sources energy potential
2015/8/27
The study analyses data obtained from the production of energy chips from logging residues. Geographically, the data come from the south-eastern portion of the Czech Republic. 6,671 t of energy chips ...
SUB-PIXEL AND MAXIMUM LIKELIHOOD CLASSIFICATION OF LANDSAT ETM+ IMAGES FOR DETECTING ILLEGAL LOGGING AND MAPPING TROPICAL RAIN FOREST COVER TYPES IN BERAU, EAST KALIMANTAN, INDONESIA
Su-pixel Maximum Likelihood Forest Detection
2015/7/30
The tropical forest is depleting at a fast rate due to deforestation and degradation. Illegal logging was reported to be the cause of 50%
of the deforestation. Illegal logging is a very pressing iss...