MEng thesisThis thesis provides a complete design and implementation of audit trail collection and storage for Aeolus, a distributed security platform based on information flow control. An information flow control system regulates all activities that concern information security. By recording all the operations monitored by Aeolus, our audit trails capture all actions that can affect system security. In our system, event records are collected on each system node and shipped to a centralized location, where they are stored and processed. To correlate audit trail events of different system nodes we store event dependencies directly in the event records. Each audit trail record keeps links to its immediate predecessors. Therefore, our audit tr...
Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glea...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
This thesis presents the design and implementation of a file system for Aeolus, a distributed securi...
PhD thesisPrivate and confidential information is increasingly stored online and increasingly being ...
AbstractOne approach to secure systems is through the analysis of audit trails. An audit trail is a ...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
This paper reports the results of a research project which examines the feasibility of developing a ...
To aid threat detection and investigation, enterprises are increasingly relying on commercially avai...
This paper reports the results of a research project which examines the feasibility of developing a ...
Insider threats can pose a great risk to organizations and by their very nature are difficult to pro...
Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glea...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
This thesis presents the design and implementation of a file system for Aeolus, a distributed securi...
PhD thesisPrivate and confidential information is increasingly stored online and increasingly being ...
AbstractOne approach to secure systems is through the analysis of audit trails. An audit trail is a ...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
This paper reports the results of a research project which examines the feasibility of developing a ...
To aid threat detection and investigation, enterprises are increasingly relying on commercially avai...
This paper reports the results of a research project which examines the feasibility of developing a ...
Insider threats can pose a great risk to organizations and by their very nature are difficult to pro...
Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glea...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Efforts have been made over the last decades in order to design and perfect Intrusion Detection Sys...