Back to Results
First PageMeta Content
Computer data logging / Public-key cryptography / Log analysis / Log / Computing / Technology / Data logger / Recorders


Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
Add to Reading List

Document Date: 2014-11-11 20:30:18


Open Document

File Size: 349,50 KB

Share Result on Facebook

City

Redmond / /

Company

TPM NV / Monotonic NV / Microsoft / Protocol B / /

Country

United States / /

/

Event

Force Majeure / /

Facility

Carnegie Mellon University / /

IndustryTerm

hash chain / remote server / basic protocol / tamper-proof logging protocols / log producer / basic secure logging protocol / online commitments / employee devices / storage device / anti-malware software / branched key chain / /

Organization

Carnegie Mellon University / Pittsburgh / /

Position

Logging The logger / Protocol Description Logger The logger / log producer / administrator / logger / Logger The logger / /

Product

iPads / /

ProvinceOrState

Washington / /

Technology

encryption / RAM / logging protocol / public key / basic secure logging protocol / basic protocol / logging protocols / tamper-proof logging protocols / secret key / 4.2 Protocol / 3.1 Protocol Description Protocol / /

SocialTag