Essays about: "Tamper-evident"
Found 2 essays containing the word Tamper-evident.
-
1. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
2. Aggregating Certificate Transparency Gossip Using Programmable Packet Processors
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verified by anyone. For example, it is possible to challenge a log to prove certificate inclusion (membership) and log consistency (append-only, no tampering) based on partial information. READ MORE