Secure and Transparent Audit Logs with BlockAudit.
Ashar AhmadMuhammad SaadAziz MohaisenPublished in: CoRR (2019)
Keyphrases
- intrusion detection
- data mining techniques
- log data
- security issues
- multi party
- data mining
- security requirements
- sensitive data
- security mechanisms
- standard model
- log analysis
- key exchange protocol
- data encryption
- key agreement protocol
- identity management
- security properties
- key distribution
- highly efficient
- information sharing
- information systems