Adding availability to log services of untrusted machines | IEEE Conference Publication | IEEE Xplore