Sciweavers

425 search results - page 2 / 85
» Audit
Sort
View
PODS
2005
ACM
97views Database» more  PODS 2005»
14 years 7 months ago
Simulatable auditing
Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim
RAID
1999
Springer
13 years 11 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
ACSAC
2000
IEEE
13 years 12 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
JSS
2002
88views more  JSS 2002»
13 years 7 months ago
Software project management audits - update and experience report
This paper describes software project management audits as they have been defined in the literature. It outlines the motivation for conducting such audits routinely, which differs...
James McDonald