Back to Results
First PageMeta Content
ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security


Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department
Add to Reading List

Document Date: 2004-11-17 13:32:31


Open Document

File Size: 551,09 KB

Share Result on Facebook

City

the Identity / Palo Alto / /

Company

the New York Times / AES / G1 / USENIX Press / Shamus Software Ltd. / G2 / Stanford Applied Cryptography Group / MySQL / /

Currency

pence / /

/

Facility

Stanford Identity-Based Encryption library / Cryptlib library / Rational Arithmetic C/C++ Library / /

IndustryTerm

hash chain / legitimate search access / verifiable audit log systems / server software / search capabilities / Web Proceedings / search/decrypt / search access / verifier systems / search keyword capability / indexing algorithm / search/decryption pairings / search capability / keyword search capability / legitimate search capabilities / search capability component corresponding / keyword search / search keywords / keyword search capabilities / database server / jth server / proxy server / particular audit log server / audit log server / on-line fashion / keyword search information cwn / /

OperatingSystem

Linux / /

Organization

Princeton University / Palo Alto Research Center / Stanford / /

Person

Alice Alice Smith Smith / Proc / Alice Smith / /

/

Position

investigator / wb / author / logger / /

Product

Franklin / /

ProgrammingLanguage

C++ / /

ProvinceOrState

New Jersey / California / /

PublishedMedium

the New York Times / Lecture Notes in Computer Science / /

Technology

indexing algorithm / 2 The Identity-Based Encryption / particular IdentityBased Encryption / Linux / identity-based encryption / private key / encryption / above Identity-Based Encryption / cryptography / IBE encryptions / symmetric encryption / searchable public-key encryption / public key / proxy server / public-key encryption / system parameters P. Encryption / Searchable public key encryption / http / IBE encryption / block encryption / /

URL

http /

SocialTag