The organization of the RIACS auditing package is described along with how to installation instructions and how to interpret the output. How to set up both local and remote file system auditing is given. Logging is done on a time driven basis, and auditing in a passive mode
This paper reports the results of a research project which examines the feasibility of developing a ...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
The Display Audit Suite is an integrated package of software tools that partly automates the detecti...
Although Novell Netware 286 provides excellent access control at both the server and the directory l...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
This paper reports the results of a research project which examines the feasibility of developing a ...
An accounting package was developed which determines the computer resources utilized by a user durin...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Traditionally, computer security monitoring systems are built around the audit systems supplied by o...
Includes bibliographical references.During the decade of the 1950's, first generation computers were...
The article is aimed at determining the order and methodology of auditing the software of the comput...
Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glea...
Automation, remote access, and continuous access to enterprise data provide opportunities for intern...
This paper reports the results of a research project which examines the feasibility of developing a ...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
The Display Audit Suite is an integrated package of software tools that partly automates the detecti...
Although Novell Netware 286 provides excellent access control at both the server and the directory l...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
This paper reports the results of a research project which examines the feasibility of developing a ...
An accounting package was developed which determines the computer resources utilized by a user durin...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Traditionally, computer security monitoring systems are built around the audit systems supplied by o...
Includes bibliographical references.During the decade of the 1950's, first generation computers were...
The article is aimed at determining the order and methodology of auditing the software of the comput...
Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glea...
Automation, remote access, and continuous access to enterprise data provide opportunities for intern...
This paper reports the results of a research project which examines the feasibility of developing a ...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...