Show simple item record

The Packet Vault: Secure Storage of Network data

dc.contributor.authorAntonelli, C. J.en_US
dc.contributor.authorUndy, M.en_US
dc.contributor.authorHoneyman, P.en_US
dc.date.accessioned2014-07-18T18:11:58Z
dc.date.available2014-07-18T18:11:58Z
dc.date.issued1998-06-25en_US
dc.identifier.citationC. J. Antonelli, M. Undy, and P. Honeyman, "The Packet Vault: Secure Storage of Network Data," June 1998. [USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara (April 1999). <http://hdl.handle.net/2027.42/107921>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107921
dc.description.abstractThis paper describes the packet vault, a cryptographically secured archiver of network packet data. The vault captures network packets, encrypts them, and writes them to long-term CD-ROM storage for later analysis and evidentiary purposes. The cryptographic organization of the vault permits selected traffic to be made available without compromising the security of other traffic. Some weaknesses remain in the vault; we conclude with a description of present experiences and future plans.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titleThe Packet Vault: Secure Storage of Network dataen_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationumCenter for Information Technology Integrationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107921/1/citi-tr-98-5.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.