{"id":"https://openalex.org/W4388282444","doi":"https://doi.org/10.1145/3631524","title":"Forward Security with Crash Recovery for Secure Logs","display_name":"Forward Security with Crash Recovery for Secure Logs","publication_year":2023,"publication_date":"2023-11-03","ids":{"openalex":"https://openalex.org/W4388282444","doi":"https://doi.org/10.1145/3631524"},"language":"en","primary_location":{"id":"doi:10.1145/3631524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3631524","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045932031","display_name":"Erik-Oliver Bla\u00df","orcid":"https://orcid.org/0009-0008-2791-1564"},"institutions":[{"id":"https://openalex.org/I4210136903","display_name":"Airbus (Germany)","ror":"https://ror.org/04a3akw68","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210121748","https://openalex.org/I4210136903"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Erik-Oliver Blass","raw_affiliation_strings":["Airbus, Germany, Germany"],"affiliations":[{"raw_affiliation_string":"Airbus, Germany, Germany","institution_ids":["https://openalex.org/I4210136903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008859536","display_name":"Guevara Noubir","orcid":"https://orcid.org/0000-0001-5876-2874"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guevara Noubir","raw_affiliation_strings":["Northeastern University, USA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, USA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045932031"],"corresponding_institution_ids":["https://openalex.org/I4210136903"],"apc_list":null,"apc_paid":null,"fwci":0.4007,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.626619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"27","issue":"1","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.729762852191925},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5783076882362366},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.5148128867149353},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5032286047935486},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4665486514568329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4412960708141327},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17078307271003723},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10019144415855408},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07426038384437561}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.729762852191925},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5783076882362366},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.5148128867149353},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5032286047935486},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4665486514568329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4412960708141327},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17078307271003723},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10019144415855408},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07426038384437561}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3631524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3631524","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W135467536","https://openalex.org/W154665396","https://openalex.org/W1515945955","https://openalex.org/W1570425181","https://openalex.org/W1909442527","https://openalex.org/W1915075355","https://openalex.org/W1979740015","https://openalex.org/W1983949504","https://openalex.org/W1987593503","https://openalex.org/W1987847892","https://openalex.org/W1995875735","https://openalex.org/W2035476608","https://openalex.org/W2061142304","https://openalex.org/W2065692759","https://openalex.org/W2071483197","https://openalex.org/W2118179522","https://openalex.org/W2128765501","https://openalex.org/W2140655888","https://openalex.org/W2183816381","https://openalex.org/W2725017650","https://openalex.org/W4229922087","https://openalex.org/W4245671428","https://openalex.org/W6629958140"],"related_works":["https://openalex.org/W2026516036","https://openalex.org/W4388150944","https://openalex.org/W626940945","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W4368232262","https://openalex.org/W2808242528","https://openalex.org/W1567638270","https://openalex.org/W4285163392","https://openalex.org/W3110049015"],"abstract_inverted_index":{"Logging":[0],"is":[1,18,130,157,171,183,221,238],"a":[2,80,99,108,120,125,139,295],"key":[3,166],"mechanism":[4],"in":[5,35,185,197,223,227,294],"the":[6,33,58,65,71,133,154,169,172,186,233,236,243,258],"security":[7,15,48,267],"of":[8,60,68,73,102,119,128,145,153,168,174,189,235,246,261,266],"computer":[9],"systems.":[10],"Beyond":[11],"supporting":[12],"important":[13],"forward":[14,47,62,92,163],"properties,":[16],"it":[17,115],"critical":[19],"that":[20,181,206],"logging":[21,69],"withstands":[22],"both":[23],"failures":[24],"and":[25,64,78,96,160,195,225,252],"intentional":[26],"tampering":[27],"to":[28,116,124,138,179,207,211,256,263,280,285],"prevent":[29,70],"subtle":[30],"attacks":[31],"leaving":[32],"system":[34,296],"an":[36,274],"inconsistent":[37],"state":[38],"with":[39,49,162,209],"inconclusive":[40],"evidence.":[41],"We":[42,250,269],"propose":[43,77,251],"new":[44,109],"techniques":[45,178,255],"combining":[46],"crash":[50],"recovery":[51,144,262],"for":[52],"secure":[53],"log":[54,110,148,191,217,286,304],"data":[55,276,292,299],"storage.":[56],"As":[57],"support":[59],"specifically":[61],"integrity":[63],"online":[66,94],"nature":[67],"use":[72,173],"conventional":[74],"coding,":[75],"we":[76,141,204],"analyze":[79],"coding":[81,90,155],"scheme":[82,156,272],"resolving":[83],"these":[84],"unique":[85],"design":[86],"constraints.":[87],"Specifically,":[88],"our":[89,271],"enables":[91],"integrity,":[93],"encoding,":[95],"most":[97],"importantly":[98],"constant":[100,184,222],"number":[101,187],"operations":[103],"per":[104],"encoding.":[105],"It":[106],"adds":[107],"item":[111],"by":[112,132],"\ud835\uddb7\ud835\uddae\ud835\uddb1":[113],"ing":[114],"k":[117,182,200,230],"cells":[118,129],"table.":[121],"If":[122],"up":[123,210],"certain":[126],"threshold":[127],"modified":[131,214],"adversary,":[134],"or":[135,215,288],"lost":[136,216,303],"due":[137],"crash,":[140],"still":[142],"guarantee":[143],"all":[146,190,247],"stored":[147,194],"items.":[149,249],"The":[150,165,298],"main":[151],"advantage":[152],"its":[158],"efficiency":[159],"compatibility":[161],"integrity.":[164],"contribution":[167],"paper":[170],"spectral":[175],"graph":[176],"theory":[177],"prove":[180,205],"n":[188,224,248],"items":[192,287],"ever":[193],"small":[196,226],"practice,":[198],"e.g.,":[199],"=":[201,231],"5.":[202],"Moreover,":[203],"cope":[208],"\\(\\sqrt":[212],"{n}\\)":[213],"items,":[218,305],"storage":[219],"expansion":[220],"practice.":[228],"For":[229],"5,":[232],"size":[234],"table":[237],"only":[239],"12%":[240],"more":[241],"than":[242],"simple":[244],"concatenation":[245],"evaluate":[253],"original":[254],"scale":[257],"computation":[259],"cost":[260],"several":[264],"GBytes":[265],"logs.":[268],"instantiate":[270],"into":[273],"abstract":[275],"structure":[277,300],"which":[278],"allows":[279],"either":[281],"detect":[282],"adversarial":[283,309],"modifications":[284,290],"treat":[289],"like":[291],"loss":[293],"crash.":[297],"can":[301],"recover":[302],"thereby":[306],"effectively":[307],"reverting":[308],"modifications.":[310]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
