Abstract
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey's secure audit logging protocol, strengthening the protocol by using tamper-resistant hardware (an iButton) in two ways: Firstly our implementation of the protocol works offline as well as online. Secondly, we use unforgeable time stamps to increase the possibilities of fraud detection. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.
Original language | Undefined |
---|---|
Title of host publication | 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC) |
Editors | D. Gritzalis, S. De Capitani di Vimercati, S.K. Katsikas, P. Samarati |
Place of Publication | Boston, Massachusetts |
Publisher | Kluwer Academic Publishers |
Pages | 73-84 |
Number of pages | 12 |
ISBN (Print) | 1-4020-7449-2 |
Publication status | Published - May 2003 |
Event | IFIP TC11 18th International Conference on Information Security, SEC 2003 - Athens, Greece Duration: 26 May 2003 → 28 May 2003 Conference number: 18 |
Publication series
Name | |
---|---|
Publisher | Kluwer Academic Publishers Boston |
Other
Other | IFIP TC11 18th International Conference on Information Security, SEC 2003 |
---|---|
Abbreviated title | SEC |
Country/Territory | Greece |
City | Athens |
Period | 26/05/03 → 28/05/03 |
Keywords
- EWI-816
- SCS-Cybersecurity
- IR-41370
- METIS-214046