Information Technology Reference
In-Depth Information
[23] Schneider, F.B.: Accountability for Perfection. IEEE Security & Privacy 7(2), 3-4
(2009)
[24] Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM
Transactions on Information and System Security 2(2), 159-176 (1999)
[25] Skene, J., Raimondi, F., Emmerich, W.: Service-Level Agreements for Electronic
Services. IEEE Transactions on Software Engineering 36(2), 288-304 (2010)
[26] Stirewalt, R.E.K., Dillon, L.K., Kraemer, E.: The Inference Validity Problem in
Legal Discovery. In: International Conference on Software Engineering (ICSE),
pp. 303-306. IEEE, Los Alamitos (2009)
[27] Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an Encrypted and
Searchable Audit Log. In: Proceedings of the Network and Distributed System
Security. The Internet Society (2004)
 
Search WWH ::




Custom Search