{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:46:23Z","timestamp":1742957183777,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_19","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"226-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Khan Ferdous","family":"Wahid","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Kaufmann","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Jones","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"19_CR1","unstructured":"EU FP7-Security: PERSEUS - Protection of European seas and borders through the intelligent use of surveillance, Project reference: 261748 (2011\u20132015)"},{"key":"19_CR2","unstructured":"EU Horizon 2020: EU CIRCLE - A pan-European framework for strengthening Critical Infrastructure resilience to climate change, Project reference: 653824 (2015\u20132018)"},{"key":"19_CR3","unstructured":"EU EPCIP: NEISAS - National and European Information Sharing and Alerting System, Project reference: JLS\/2008\/CIPS\/016 (2008\u20132011)"},{"key":"19_CR4","unstructured":"EU FP5-EESD: EFFS - An european flood forecasting system, Project reference: EVG1-CT-1999-00011 (2000\u20132003)"},{"key":"19_CR5","unstructured":"EU FP7-Security: ECOSSIAN - European COntrol System Security Incident Analysis Network, Project reference: 607577 (2014\u20132017)"},{"key":"19_CR6","unstructured":"EU FP7-SEC-2010-1: BRIDGE - Bridging resources and agencies in large-scale emergency management, Project reference: 261817 (2011\u20132015)"},{"key":"19_CR7","unstructured":"Younis, Y.A., Merabti, M., Kifayat, K.: Secure cloud computing for critical. infrastructure: a survey. In: 14th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (2013)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Ma, D., Tsudik, G.: A new approach to secure logging. Cryptology ePrint Archive: Report 2008\/185 (2008)","DOI":"10.1007\/978-3-540-70567-3_4"},{"key":"19_CR9","unstructured":"Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of San Diego (1997)"},{"key":"19_CR10","unstructured":"Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th USENIX Security Symposium (1998)"},{"key":"19_CR11","unstructured":"Holt, J.E.: Logcrypt: forward security and public verification for secure audit logs. In: Proceedings of the 2006 Australasian Workshops on Grid Computing and e-Research, Australia (2006)"},{"key":"19_CR12","unstructured":"Waters, B., Balfanz, D., Durfee, G., Smeters, D.K.: Building an encrypted and searchable audit log. In: ACM Annual Symposium on Network and Distributed System Security (NDSS04) (2004)"},{"key":"19_CR13","unstructured":"Crossby, S.A., Wallach, D.S.: Efficient data structures for tamper-evident logging. In: Proceedings of the 18th Conference on USENIX Security Symposium (2009)"},{"key":"19_CR14","unstructured":"Chong, C., Peng, Z., Hartel, P.: Secure audit logging with tamper resistant hardware. Technical report TR-CTIT-02-29, Centre for Telematics and Information Technology, University Twente, The Netherlands (2002)"},{"key":"19_CR15","unstructured":"Wouters, K.: Hash-chain based protocols for time-stamping and secure logging: formats, analysis and design. Dissertation report. Arenberg Doctoral School of Science, Engineering and Technology, Katholieke Universiteit Leuven, Belgium (2012)"},{"key":"19_CR16","unstructured":"Pulls, T., Wouters, K., Vliegen, J., Grahn, C.: Distributed Privacy-Preserving Log Trails. Faculty of Economic Sciences, Communication and IT, Computer Science, Karlstad University Studies, Sweden (2012)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-22633-5_8","volume-title":"Public Key Infrastructures, Services and Applications","author":"R Accorsi","year":"2011","unstructured":"Accorsi, R.: BBox: a distributed secure log architecture. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 109\u2013124. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-22633-5_8"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-08593-7_2","volume-title":"Trust and Trustworthy Computing","author":"A Sinha","year":"2014","unstructured":"Sinha, A., Jia, L., England, P., Lorch, J.R.: Continuous tamper-proof logging using TPM 2.0. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 19\u201336. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-08593-7_2"},{"key":"19_CR19","unstructured":"Andersson, M., Nilsson, A.: Improving integrity assurances of log entries from the perspective of intermittently disconnected devices. Masters thesis no. MECS-2014-10, Faculty of Computing, Blekinge Institute of Technology, Sweden (2014)"},{"key":"19_CR20","unstructured":"Trusted Computing Group: Trusted Computing Group, TPM Library Specification. \n                    http:\/\/www.trustedcomputinggroup.org\/tpm-library-specification\/"},{"key":"19_CR21","unstructured":"Dijk, M.V., Sarmenta, L.F.G., Rhodes, J., Devadas, S.: Securing shared untrusted storage by using TPM 1.2 without requiring a trusted OS. Technical report, MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) (2007)"},{"key":"19_CR22","unstructured":"Trusted Computing Group: ISO\/IEC 11889\u20132:2009(E), Information technology Trusted Platform Module Part 2: Design principles, 2009 (2009). \n                    http:\/\/www.iso.org\/iso\/home\/store\/catalogue_ics\/catalogue_detail_ics.htm?csnumber=50971"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an Execution Infrastructure for TCB Minimization. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems (2008)","DOI":"10.1145\/1352592.1352625"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Jain, P., Desai, S., Kim, S., Shih, M.W., Lee, J., Choi, C., Shin, Y., Kim, T., Kang, B.B., Han, D.: OpenSGX: an open platform for SGX research. In: Proceedings of the Network and Distributed System Security Symposium, NDSS (2016)","DOI":"10.14722\/ndss.2016.23011"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C., Shafi, H., Shanbhogue, V., Savagaonkar, U.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"19_CR26","unstructured":"Anati, I., Gueron, S., Johnson, S.P., Scarlata, V.R.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (2013)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Hoekstra, M., Lal, R., Rozas, C., Phegade, V., Cuvillo, J.D.: Using innovative instructions to create trustworthy software solutions. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy (2013)","DOI":"10.1145\/2487726.2488370"},{"key":"19_CR28","unstructured":"Linux Integrity Measurement Architecture (IMA): Linux Integrity Subsystem. \n                    http:\/\/linux-ima.sourceforge.net\/"},{"key":"19_CR29","unstructured":"Halcrow, M.A.: eCryptfs: An Enterprise-class Encrypted Filesystem for Linux. \n                    https:\/\/www.kernel.org\/doc\/ols\/2005\/ols2005v1-pages-209-226.pdf"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Hein, D., Winter, J., Fitzek, A.: Secure block device - secure, flexible, and efficient data storage for ARM TrustZone Systems. In: TrustCom (2015)","DOI":"10.1109\/Trustcom.2015.378"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-68979-9_2","volume-title":"Trusted Computing - Challenges and Applications","author":"S Bratus","year":"2008","unstructured":"Bratus, S., D\u2019Cunha, N., Sparks, E., Smith, S.W.: TOCTOU, traps, and trusted computing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 14\u201332. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-68979-9_2"},{"key":"19_CR32","unstructured":"rsyslog: The rocket-fast system for log processing. \n                    http:\/\/www.rsyslog.com\/"},{"key":"19_CR33","unstructured":"PolarSSL: PolarSSL SSL library. \n                    https:\/\/tls.mbed.org\/download\/start\/polarssl-1.3.9-gpl.tgz"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:03:37Z","timestamp":1558321417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/critis2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}