Sciweavers

80 search results - page 2 / 16
» Audit logs: to keep or not to keep
Sort
View
ISSADS
2005
Springer
13 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
APN
2007
Springer
13 years 11 months ago
History-Dependent Petri Nets
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We cons...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
GRID
2008
Springer
13 years 6 months ago
Pilot job accounting and auditing in Open Science Grid
The Grid accounting and auditing mechanisms were designed under the assumption that users would submit their jobs directly to the Grid gatekeepers. However, many groups are starti...
Igor Sfiligoi, Greg Quinn, Chris Green, Greg Thain
ICADL
2003
Springer
149views Education» more  ICADL 2003»
13 years 10 months ago
Approximating Fair Use in LicenseScript
Current rights management systems are not able to enforce copyright laws because of both legal and technological reasons. The contract rights granted by a copyright owner are often...
Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel,...
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
13 years 7 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...