>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到logging相关记录44条 . 查询时间(0.046 秒)
We present a practical solution to design a secure logging system that provides confidentiality, integrity, completeness, and non-repudiation. To the best of our knowledge, our solution is the first p...
We present Steady: an end-to-end secure logging system engineered to be simple in terms of design, implementation, and assumptions for real-world use. Steady gets its name from being based on a steady...
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
The aim of the present study was to analyse the impacts of different logging intensities after five years from logging including non-logged, low (3.4 felled stems per hectare), medium (5.2 felled stem...
Attacks on Secure Logging Schemes     Log Files  LogFAS  FssAgg       2017/2/20
We present four attacks on three cryptographic schemes intended for securing log files against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by Yavuz et al. (Financi...
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks ...
The aim is to conduct experimental measurements and analyses of physical and mental workload of harvester operators. Among other things, monitoring and analyses of work conditions and workload help re...
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
Computer log files constitute a precious resource for system administrators for discovering and comprehending security breaches. A prerequisite of any meaningful log analysis is that attempts of int...
Insynd is a cryptographic scheme for privacy-preserving transparency logging. In the setting of transparency logging, a service provider continuously logs descriptions of its data processing on its us...
A “3D photo-logging system,” a new method for recording archaeological sites, was developed. The prototype system consists of several servers running on a single machine and logging units composed of ...
While well logging, a continuous recording of the physical parameters down a borehole, is employed systematically in petroleum exploration, its application in environmental prospections, such as hydro...
The occurrences of early-arriving saproxylic beetles were examined on 1,200 fragments of Scots pine (Pinus sylvestris L.) logging residues generated by thinning in a single stand in the Drahanská High...
The study analyses data obtained from the production of energy chips from logging residues. Geographically, the data come from the south-eastern portion of the Czech Republic. 6,671 t of energy chips ...
The tropical forest is depleting at a fast rate due to deforestation and degradation. Illegal logging was reported to be the cause of 50% of the deforestation. Illegal logging is a very pressing iss...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...