Watch Now Registration not required
The authenticity of archived electronic records is established manually by ad hoc methods, such as checking software and examining audit logs. A more cost-effective and scalable mechanism is proposed to establish the integrity and creation time of electronic documents. This solution protects against a powerful inside attacker who has incentives to modify documents after they are generated. The proposed framework enables rigorous auditing and assessment of organizational compliance. The attendee of this webcast will learn the scenarios in which current methods for document authenticity provide good assurances - and when improvements may be beneficial and the different types of time-stamping assurance that may be of interest to organizations to meet compliance requirements.
- Format: Webcast
- Size: 0 KB