Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
How much time the user spends working on a task versus fiddling with the tool is an important aspect of usability. The concept of the ratio and distribution of tool-only operation...
Susan S. Kirschenbaum, Wayne D. Gray, Brian D. Ehr...
There exist several approaches to improve the quality of evolution. In this paper, a priori design knowledge as a part of evolving systems is discussed. Further, experiments are r...
In this paper, first we describe rushes summarization system which is made this year for the TRECVID2008 BBC rushes task. Our aim this year is to build up base system using minimu...
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...