ARTICLE:ANALYSIS_BY[name] student5 ARTICLE:ANALYSIS_TIME[minutes] 20 ARTICLE:COMMENT[string] The authors develop a new scheme for secure data logging and show proof. Implementation from Dr. Di Ma (acknowledged in paper) has been used for results. ARTICLE:COMMERCIAL_EFFORT[none,part,full] none ARTICLE:GRANT_SUPPORT[none or string] This work was supported by the U.S. National Science Foundation (NSF) under grants CAREER-0447761 and 0910767, and the U.S. Army Research Office (ARO) under grant W911NF-08-1-0105 managed by NCSU Secure Open Systems Initiative (SOSI) ARTICLE:IMPLEMENTATION_EXISTS[unknown,hardware,yes,no] no ARTICLE:LINK[url] http://doi.acm.org/10.1145/2240276.2240280 ARTICLE:NSF_SUPPORT[none or number] CAREER-0447761, 0910767 ARTICLE:PAGE_COUNT[pages] 28 ARTICLE:STATUS[not_finished,finished] finished ARTICLE:TYPE[conference,journal,poster,abstract] journal AUTHOR:NAMES[list of first_last] Attila_Altay_Yavuz Peng_Ning Michael_K._Reiter BIBTEX:LABEL[string] YavuzNR12 BIBTEX:LINK[url] http://dblp.uni-trier.de/rec/bibtex/journals/tissec/YavuzNR12 BUILD:ANALYSIS_BY[name] BUILD:ANALYSIS_TIME[minutes] BUILD:BENEFIT_OF_DOUBT[unknown,yes,no] unknown BUILD:COMMENT[string] BUILD:ERROR_COMMENT[not_needed,comment] not_needed BUILD:STATUS[one of {unknown,needed,not_needed,started,finished} and list of {downloaded,compiles,runs}] not_needed BUILD:VERIFY_BY[name] BUILD:VERIFY_COMMENT[string] BUILD:VERIFY_STATUS[needed,not_needed,started,finished] not_needed BUILD:VERIFY_TIME[minutes] COMMENT:CORRECTION[string] COMMENT:RESPONSE[string] COMMENT:UPDATE[string] EMAIL1:CODE_AVAILABLE[yes,no,no_response] EMAIL1:REMARK[comment] EMAIL:STATUS[unknown,not_needed,not_found or list of {needed,request_1,response_1,sent_thank_you}] not_needed PI:COMMENT_CC[string] They measure performance. So, we need access to their code. Proof of correctness means nothing, by the way! PI:COMMENT_TP[string] TOOL:ARTICLE_LINK[unknown,none,url,broken and url] none TOOL:DATA_LINK[unknown,none,url,broken and url] unknown TOOL:EMAIL_LINK[unknown,none,sent_no_url,url,broken and url] unknown TOOL:GOOGLE_LINK[unknown,none,url,broken and url] none TOOL:NAME[string] VERIFY:ANALYSIS_BY[name] student0 VERIFY:COMMENT[string] Since proofs exist for the effectiveness of the system, I'm not sure either if it is necessary to ask for implementaitons. VERIFY:STATUS[unknown,needed,not_needed,started,finished] finished