{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:10:24Z","timestamp":1736295024019,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_6","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"58-72","source":"Crossref","is-referenced-by-count":10,"title":["Delegating Secure Logging in Pervasive Computing Systems"],"prefix":"10.1007","author":[{"given":"Rafael","family":"Accorsi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adolf","family":"Hohl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Autonomic computing initiative (2005), http:\/\/www.research.ibm.com\/autonomic\/"},{"key":"6_CR2","unstructured":"BEEP web site (2005), http:\/\/www.beepcore.org"},{"key":"6_CR3","unstructured":"Reliable syslog web site (2005), http:\/\/security.sdsc.edu\/software\/sdsc-syslog\/"},{"key":"6_CR4","unstructured":"Syslog-ng web site (2005), http:\/\/www.balabit.com\/products\/syslog_ng"},{"key":"6_CR5","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance: A cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311. USENIX Assoc. (1996)"},{"key":"6_CR6","unstructured":"Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, University of California at San Diego, Dept. of Computer Science & Engineering (1997)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bla\u00df, E.-O., Zitterbart, M.: Towards acceptable public-key encryption in sensor networks. In: Most\u00e9faoui, S.K., Maamar, Z. (eds.) IWUC, pp. 88\u201393. INSTICC Press (2005)","DOI":"10.5220\/0002563200880093"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-32004-3_14","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2005","unstructured":"Creese, S., Goldsmith, M., Harrison, R., Roscoe, B., Whittaker, P., Zakiuddin, I.: Exploiting empirical engagement in authentication protocol design. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 119\u2013133. Springer, Heidelberg (2005)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39881-3_12","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2004","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 116\u2013129. Springer, Heidelberg (2004)"},{"issue":"29","key":"6_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a02(29), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-45831-X_12","volume-title":"Infrastructure Security","author":"U. Flegel","year":"2002","unstructured":"Flegel, U.: Pseudonymizing unix log files. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 162\u2013179. Springer, Heidelberg (2002)"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.274999","volume":"27","author":"G. Forman","year":"1994","unstructured":"Forman, G., Zahorjan, J.: The challenges of mobile computing. IEEE Computer\u00a027(4), 38\u201347 (1994)","journal-title":"IEEE Computer"},{"key":"6_CR13","volume-title":"Secure Coding: Principles & Practices","author":"M.G. Graff","year":"2003","unstructured":"Graff, M.G., van Wyk, K.R.: Secure Coding: Principles & Practices. O\u2019Reilly, Sebastopol (2003)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-540-32004-3_16","volume-title":"Security in Pervasive Computing","author":"A. Hohl","year":"2005","unstructured":"Hohl, A., Lowis, L., Zugenmaier, A.: Look who\u2019s talking \u2013 authenticating service access points. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 151\u2013162. Springer, Heidelberg (2005)"},{"key":"6_CR15","first-page":"355","volume-title":"Proceedings of the Conference on Computer and Communication Security","author":"G. Itkis","year":"2003","unstructured":"Itkis, G.: Cryptographic tamper evidence. In: Proceedings of the Conference on Computer and Communication Security, pp. 355\u2013364. ACM Press, New York (2003)"},{"key":"6_CR16","unstructured":"Kelsey, J., Callas, J.: Signed syslog messages. IETF Internet Draft (2005), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-syslog-sign-16.txt"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J.C., Horowitz, M.: Architectural support for copy and tamper resistant software. In: ASPLOS, pp. 168\u2013177 (2000)","DOI":"10.21236\/ADA419599"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Lonvick, C.: RFC\u00a03164: The BSD syslog protocol. Request for Comments (2001), http:\/\/www.ietf.org\/rfc\/rfc3164.txt","DOI":"10.17487\/rfc3164"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"New, D., Rose, M.: RFC\u00a03195: Reliable delivery for syslog. Request for Comments (2001), http:\/\/www.ietf.org\/rfc\/rfc3195.txt","DOI":"10.17487\/rfc3195"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: Die PERSEUS Systemarchitektur (2001)","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"6_CR21","unstructured":"Poritz, J., Schunter, M., Herreweghen, E.V., Waidner, M.: Property attestation - scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM Corporation (2004)"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-24591-9_22","volume-title":"Information Security Applications","author":"A.-R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Taming \u201ctrusted platforms\u201d by operating system design. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 286\u2013302. Springer, Heidelberg (2004)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications, 10\u201317 (2001)","DOI":"10.1109\/98.943998"},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0167-739X(97)00004-6","volume":"13","author":"B. Schneier","year":"1997","unstructured":"Schneier, B., Kelsey, J.: Remote auditing of software outputs using a trusted coprocessor. Future Generation Computer Systems\u00a013(1), 9\u201318 (1997)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"6_CR25","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B. Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J.: Security audit logs to support computer forensics. ACM Transactions on Information and System Security\u00a02(2), 159\u2013176 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"6_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"F. Stajano","year":"2002","unstructured":"Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)"},{"key":"6_CR27","unstructured":"Trusted Computing Group. TCG Backgrounder (May 2003)"},{"key":"6_CR28","unstructured":"Wang, J., Yang, Y., Yurcik, W.: Secure smart environments: Security requirements, challenges and experiences in pervasive computing. In: NSF Infrastructure Experience 2005, NSF\/CISE\/CNS Pervasive Computing Infrastructure Experience Workshop (2005)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:39:49Z","timestamp":1736293189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11734666_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}