Sciweavers

191 search results - page 39 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
SAC
2011
ACM
12 years 8 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty