Sciweavers

67 search results - page 1 / 14
» Auditing for Accessibility
Sort
View
RAID
1999
Springer
13 years 9 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
ACSAC
2006
IEEE
13 years 11 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
VLDB
2004
ACM
113views Database» more  VLDB 2004»
13 years 10 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
WWW
2001
ACM
14 years 5 months ago
Auditing for Accessibility
The paper discusses recent web Accessibility Audits produced by the authors [8] ? audits that have the dual aims of raising accessibility levels of the subject sites and the gener...
Lorna Gibson, David Sloan, Peter Gregor, Paul Boot...
AUSFORENSICS
2003
13 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver