Abstract. While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements. Despite the growing pervasiveness of log systems, to date there is no high-level framework which allows one to model a log system and to check whether it meets the requirements it should satisfy. In this paper we propose a high-level framework for modeling log systems, and reasoning about them. This framework allows one to give a high-level representation of a log system an to check whether it satisfies given audit and privacy properties which in turn can be expressed in standard logic. In particular, the framework can be used for comp...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
Modern systems generate a tremendous amount of data, making manual investigations infeasible, hence ...
Abstract. Accountability is increasingly recognised as a cornerstone of data protection, notably in ...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
International audienceThe issues of logging for determining liability requires to define, prior to a...
Information security audit is a monitoring/logging mechanism to ensure compliance with regulations a...
Forensic examination of logs plays a big role in modern computer security. Due to the sheer amount o...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
A model of security monitoring is presented that distinguishes between two types of logging and audi...
The dependability evaluation and management of complex systems is often based on the collection of f...
Thesis (Ph.D.)--University of Washington, 2013Billions of people rely on correct and efficient execu...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relatio...
Log files provide essential information regarding the actions of processes in critical computer sys...
Sociotechnical systems (STSs), where users interact with software components, support automated logg...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
Modern systems generate a tremendous amount of data, making manual investigations infeasible, hence ...
Abstract. Accountability is increasingly recognised as a cornerstone of data protection, notably in ...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
International audienceThe issues of logging for determining liability requires to define, prior to a...
Information security audit is a monitoring/logging mechanism to ensure compliance with regulations a...
Forensic examination of logs plays a big role in modern computer security. Due to the sheer amount o...
The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that...
A model of security monitoring is presented that distinguishes between two types of logging and audi...
The dependability evaluation and management of complex systems is often based on the collection of f...
Thesis (Ph.D.)--University of Washington, 2013Billions of people rely on correct and efficient execu...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relatio...
Log files provide essential information regarding the actions of processes in critical computer sys...
Sociotechnical systems (STSs), where users interact with software components, support automated logg...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
Modern systems generate a tremendous amount of data, making manual investigations infeasible, hence ...
Abstract. Accountability is increasingly recognised as a cornerstone of data protection, notably in ...