2009 33rd Annual IEEE International Computer Software and Applications Conference 2009
DOI: 10.1109/compsac.2009.166
|View full text |Cite
|
Sign up to set email alerts
|

Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?

Abstract: While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. We elucidate the necessary secure requirements for digital evidence and extensively survey the state of the art secure logging protocols, thereby demonstrating that none of the current proposals fulfills the necessary conditions for admissible evidence.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 24 publications
0
15
0
Order By: Relevance
“…Logs are evidential documents [40]. They contain all the details and QoS metrics related to the operation of software, network components, servers, and Cloud platforms.…”
Section: Logs and Their Importancementioning
confidence: 99%
“…Logs are evidential documents [40]. They contain all the details and QoS metrics related to the operation of software, network components, servers, and Cloud platforms.…”
Section: Logs and Their Importancementioning
confidence: 99%
“…There are a number of proposals that provide a mechanism for verifying the integrity of an audit log [Accorsi, 2009;Stathopoulos et al, 2008]. Butin et al [Butin et al, 2013] address the issues of log design for accountability, such as how meaningful a posteriori compliance analysis can be performed on the logs.…”
Section: Related Workmentioning
confidence: 99%
“…On the contrary, "by detection" approaches are more appropriate for rescue processes, since they allow maintaining the required flexibility during the process execution. Mechanisms for detecting noncompliance with policy rules are already available, e.g., secure logging files [44] or forensics [45]. However, these mechanisms are not capable of preventing any misuse; in the best case they allow, e.g., the starting of additional processes for palliating or the sanctioning of detected misuse nontechnically [46].…”
Section: Compliance In Business and Rescue Processesmentioning
confidence: 99%