Troncoso et al., 2008 - Google Patents
Improving secure long-term archival of digitally signed documentsTroncoso et al., 2008
View PDF- Document ID
- 2796270393461750707
- Author
- Troncoso C
- De Cock D
- Preneel B
- Publication year
- Publication venue
- Proceedings of the 4th ACM international workshop on Storage security and survivability
External Links
Snippet
Long-term archival of signed documents presents specific challenges that do not need to be considered in short-term storage systems. In this paper we present a Secure Long-Term Archival System (SLTAS) that protects, in a verifiable way, the validity of today's digital …
- 230000005012 migration 0 abstract description 10
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109508563B (en) | Block chain-based electronic file authenticity guarantee method | |
Yakubov et al. | A blockchain-based PKI management framework | |
US7047404B1 (en) | Method and apparatus for self-authenticating digital records | |
Jin et al. | Dynamic and public auditing with fair arbitration for cloud data | |
US8719576B2 (en) | Document verification with distributed calendar infrastructure | |
Thompson | The preservation of digital signatures on the blockchain | |
Augot et al. | Transforming face-to-face identity proofing into anonymous digital identity using the bitcoin blockchain | |
JP2006072995A (en) | Storage system with reliable time stamp function | |
KR102326460B1 (en) | Trust Point Management in Ledger Systems | |
Brunner et al. | A Comparison of Blockchain-based PKI Implementations. | |
US20230318811A1 (en) | Method and apparatus for verifying user credentials | |
Maniatis et al. | Enabling the archival storage of signed documents | |
Abraham et al. | Privacy-preserving eID derivation for self-sovereign identity systems | |
US12200142B2 (en) | Time-based digital signature | |
Li et al. | A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas | |
Gudeme et al. | Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues | |
Gangadevi et al. | A survey on data integrity verification schemes using blockchain technology in Cloud Computing Environment | |
Troncoso et al. | Improving secure long-term archival of digitally signed documents | |
Oualha et al. | Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols | |
Ozcelik et al. | Cryptorevocate: A cryptographic accumulator based distributed certificate revocation list | |
Dumas et al. | Localpki: An interoperable and iot friendly pki | |
Blažič et al. | Long-term trusted preservation service using service interaction protocol and evidence records | |
CN114422138B (en) | Certificate transparentization method and system for domain name owner user-defined verification strategy | |
Yu | Usable security for named data networking | |
Halpin | All that is solid melts into air: Towards decentralized cryptographic access control |