Securing Digital Evidence
نویسندگان
چکیده
Non-repudiation of digital evidence is required by various use cases in today’s business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event. To allow for non-repudiation of such an evidence record it is required to provide evidence on the used device itself, its configuration, and the software running at the time of the event. Digital signatures as used today provide authenticity and integrity of the evidence record. However the signature gives no information about the state of the Measurement Instrument at the time of operation. The attestation of the correct operation of the evidence collector is discussed in this paper and an implemented solution is presented.
منابع مشابه
The application of the digital signature law in securing internet banking: Some preliminary evidence from Malaysia
Malaysia is one of the first countries in the world to blaze the trail for having a prescriptive legislation of governing the digital signature technology. Whilst the Digital Signature Act 1997 has always been acknowledged as one of the pioneers of a technology-specific legislative approach, the Act nevertheless, has been greatly exposed to numerous critiques, suggesting its inability to secure...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملA Secure Integrated Model For Mobile Agent Migration (SIMMAM)
Migration of an agent involves various security problems especially in heterogeneous environment. Most of the reviewed studies for securing the mobile agent depended on one security technique. The proposed model integrates well known security techniques in four security levels: securing Mobile Agent Using Agent Factory & Blueprint, securing Mobile Agent Blueprint, securing Mobile Agent Migratio...
متن کاملA Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems
With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the transmission of such digital data across secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010