{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:22:18Z","timestamp":1761578538267},"reference-count":25,"publisher":"Elsevier","isbn-type":[{"value":"9780120884698","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1016\/b978-012088469-8.50046-2","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T09:12:29Z","timestamp":1257498749000},"page":"504-515","source":"Crossref","is-referenced-by-count":23,"title":["Tamper Detection in Audit Logs"],"prefix":"10.1016","author":[{"given":"Richard T.","family":"Snodgrass","sequence":"first","affiliation":[]},{"given":"Shilong Stanley","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/B978-012088469-8.50046-2_bib1","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","article-title":"Recovery from Malicious Transactions","volume":"15","author":"Ammann","year":"2002","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"No. 1","key":"10.1016\/B978-012088469-8.50046-2_bib2","first-page":"25","article-title":"Notions of Upward Compatibility of Temporal Query Languages","volume":"Vol. 39","author":"Bair","year":"1997","journal-title":"Business Informatics (Wirtschafts Informatik)"},{"key":"10.1016\/B978-012088469-8.50046-2_bib3","article-title":"Forward Integrity for Secure Audit Logs","author":"Bellare","year":"1997"},{"key":"10.1016\/B978-012088469-8.50046-2_bib4","series-title":"Proceedings of the IEEE International Conference on Data Engineering","first-page":"276","article-title":"Using Codewords to Protect Database Data from a Class of Software Errors","author":"Bohannon","year":"1999"},{"key":"10.1016\/B978-012088469-8.50046-2_bib5","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","first-page":"136","article-title":"Flexible Authentication of XML documents","author":"Devanbu","year":"2001"},{"issue":"3","key":"10.1016\/B978-012088469-8.50046-2_bib6","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","article-title":"Authentic data publication over the Internet","volume":"11","author":"Devanbu","year":"2003","journal-title":"Journal of Computer Security"},{"key":"10.1016\/B978-012088469-8.50046-2_bib7","author":"DuBois","year":"2003"},{"key":"10.1016\/B978-012088469-8.50046-2_bib8","series-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation","first-page":"181","article-title":"Fast and secure distributed read-only file system","author":"Fu","year":"2000"},{"key":"10.1016\/B978-012088469-8.50046-2_bib9","author":"Gordon","year":"2004"},{"key":"10.1016\/B978-012088469-8.50046-2_bib10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","article-title":"How To Time-Stamp a Digital Document","volume":"3","author":"Haber","year":"1999","journal-title":"Journal of Cryptology"},{"key":"10.1016\/B978-012088469-8.50046-2_bib11","series-title":"A Consensus Glossary of Temporal Database Concepts\u2014February 1998 Version","first-page":"367","year":"1998"},{"key":"10.1016\/B978-012088469-8.50046-2_bib12","series-title":"Proceedings of the International Conference on Very Large Databases","first-page":"441","article-title":"Transaction Timestamping in (Temporal) Databases","author":"Jensen","year":"2001"},{"issue":"8","key":"10.1016\/B978-012088469-8.50046-2_bib13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1008731200105","article-title":"Rewriting Histories: Recovering from Malicious Transactions","volume":"1","author":"Liu","year":"2000","journal-title":"Distributed and Parallel Databases Journal"},{"issue":"1","key":"10.1016\/B978-012088469-8.50046-2_bib14","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/602421.602436","article-title":"On Auditing Audit Trails","volume":"46","author":"Mercuri","year":"2003","journal-title":"CACM"},{"key":"10.1016\/B978-012088469-8.50046-2_bib15","first-page":"218","article-title":"A Certified Digital Signature","volume":"Vol. 435","author":"Merkle","year":"1989"},{"key":"10.1016\/B978-012088469-8.50046-2_bib16","series-title":"Proceedings of USENIX Operating Systems Design and Implementation","article-title":"Ivy: A Read\/Write Peer-to-Peer File System","author":"Muthitacharoen","year":"2002"},{"key":"10.1016\/B978-012088469-8.50046-2_bib17","series-title":"Proceedings of ISOC","article-title":"Electronic commerce with verifiable audit trails","author":"Peha","year":"1999"},{"issue":"Issue 5","key":"10.1016\/B978-012088469-8.50046-2_bib18","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/S0020-0190(97)00186-5","article-title":"An observation on associative one-way functions in complexity theory","volume":"Vol 64","author":"Rabi","year":"1997","journal-title":"Information Processing Letters"},{"key":"10.1016\/B978-012088469-8.50046-2_bib19","unstructured":"R. Ramakrishnan and J. Gehrke, Database Management Systems, Third Edition, 2003."},{"key":"10.1016\/B978-012088469-8.50046-2_bib20","series-title":"Proceedings of PDIS Conference","first-page":"160","article-title":"Timestamping After Commit","author":"Salzberg","year":"1994"},{"issue":"2","key":"10.1016\/B978-012088469-8.50046-2_bib21","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/317087.317089","article-title":"Secure Audit Logs to Support Computer Forensics","volume":"2","author":"Schneier","year":"1999","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/B978-012088469-8.50046-2_bib22","unstructured":"Sleepycat Software Inc., Berkeley DB, 2001."},{"key":"10.1016\/B978-012088469-8.50046-2_bib23","series-title":"Proceedings of the International Conference on Very Large Databases","first-page":"289","article-title":"The Design of the POSTGRESS Storage System","author":"Stonebraker","year":"1987"},{"key":"10.1016\/B978-012088469-8.50046-2_bib24","series-title":"Proceedings of the International Conference on Very Large Dsta Bases","first-page":"171","article-title":"Using Write Protected Data Structures to Improve Software Fault Tolerance in Highly Available Database Management Systems","author":"Sullivan","year":"1991"},{"key":"10.1016\/B978-012088469-8.50046-2_bib25","author":"National Institute of Standards and Technology","year":"2002","journal-title":"Secure Hash Signature Standard"}],"container-title":["Proceedings 2004 VLDB Conference"],"original-title":[],"language":"en","deposited":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T13:40:10Z","timestamp":1590241210000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780120884698500462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9780120884698"],"references-count":25,"URL":"https:\/\/doi.org\/10.1016\/b978-012088469-8.50046-2","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}