1. Swanson, M., Guttman, B.: Generally accepted principles and practices for securing information technology systems. In: NIST, pp. 800–814 (1996)
2. Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical Report, Computer Science and Engineering Department, University of San Diego (November 1997)
3. Lecture Notes in Computer Science;M. Bellare,2003
4. U.S. Department of Defense, C.S.C.: Trusted computer system evaluation criteria (December 1985)
5. Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th USENIX Security Symposium (January 1998)