Export Citations
1 Results for: Keyword: secure log
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Searched The ACM Guide to Computing Literature (3,774,380 records)|Limit your search to The ACM Full-Text Collection (761,092 records)
- posterJuly 2019
How to Securely Record Logs based on ARM TrustZone
Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications SecurityPages 664–666https://doi.org/10.1145/3321705.3331001A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a ...