| PDF (1MB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-406937
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.40693
Zusammenfassung
Information systems in organizations are regularly subject to cyber attacks targeting confidential data or threatening the availability of the infrastructure. In case of a successful attack it is crucial to maintain integrity of the evidence for later use in court. Existing solutions to preserve integrity of log records remain cost-intensive or hard to implement in practice. In this work we ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags