Abstract | ||
---|---|---|
In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are more resilient to the identified security threats. A key role to the proposed framework is given to an independent Regulatory Authority, which is responsible to verify the integrity of the log files. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1007/11962977_22 | CRITIS |
Keywords | Field | DocType |
proposed framework,public network provider,telecommunication network provider,public communication network,new threat model,security threat,security threat model,independent regulatory authority,key role,log file | Information system,Lawful interception,Telecommunications network,Computer security,Computer science,Threat model,Login,Implementation,Verifiable secret sharing,Logging | Conference |
Volume | ISSN | ISBN |
4347 | 0302-9743 | 3-540-69083-2 |
Citations | PageRank | References |
15 | 1.14 | 8 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vassilios Stathopoulos | 1 | 355 | 16.41 |
panayiotis kotzanikolaou | 2 | 363 | 28.70 |
Emmanouil Magkos | 3 | 217 | 24.01 |