Aeolus is a programming platform that supports the development of secure applica-tions that preserve the confidentiality of information entrusted to them. An important part of the Aeolus platform is an auditing subsystem that maintains a log in which it stores information about every security related event that occurs while applications run. The log allows later analysis to determine whether the security policies of the application have been followed. For an Aeolus user, analyzing an Aeolus event log can prove to be a daunting task, especially when this log grows to include millions of records. Similarly, storing such an event log can be very costly. The system I present in this thesis provides an interface that allows the creation of user-...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
Many information systems have been around for several decades, and most of them have their underlyin...
Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitiv...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
MEng thesisThis thesis provides a complete design and implementation of audit trail collection and s...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
This thesis presents the design and implementation of a file system for Aeolus, a distributed securi...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
MEng (Computer and Electronic Engineering), North-West University, Potchefstroom CampusPrevious stud...
Information security audit is a monitoring/logging mechanism to ensure compliance with regulations a...
Software rarely comes without maintenance after it is released. There can be bugs not captured in de...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
An event log contains a historical record of the steps taken in a business process. An event log con...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
Many information systems have been around for several decades, and most of them have their underlyin...
Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitiv...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
MEng thesisThis thesis provides a complete design and implementation of audit trail collection and s...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
This thesis presents the design and implementation of a file system for Aeolus, a distributed securi...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
MEng (Computer and Electronic Engineering), North-West University, Potchefstroom CampusPrevious stud...
Information security audit is a monitoring/logging mechanism to ensure compliance with regulations a...
Software rarely comes without maintenance after it is released. There can be bugs not captured in de...
The 27th IEEE International Requirements Engineering Conference, Jeju Island, South Korea, 23-27 Sep...
An event log contains a historical record of the steps taken in a business process. An event log con...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
Many information systems have been around for several decades, and most of them have their underlyin...
Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitiv...