Tamper Detection in Audit Logs

  title={Tamper Detection in Audit Logs},
  author={Richard T. Snodgrass and Shilong Yao and Christian S. Collberg},
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a separate audit log.” The integrity of the audit log itself must also be guaranteed. This paper… CONTINUE READING
Highly Cited
This paper has 91 citations. REVIEW CITATIONS
67 Citations
22 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 67 extracted citations

92 Citations

Citations per Year
Semantic Scholar estimates that this publication has 92 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 22 references

Secure Hash Signature Standard

  • National Institute of Standards, Technology
  • August 2002.
  • 2002
Highly Influential
4 Excerpts

Electronic commerce with verifiable audit trails

  • J. M. Peha
  • Proceedings of ISOC, 1999. www.isoc.org/isoc…
  • 1999
1 Excerpt

Similar Papers

Loading similar papers…