Sciweavers

171 search results - page 3 / 35
» Securing Provenance-Based Audits
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
ACSAC
2005
IEEE
13 years 11 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
SEC
2003
13 years 6 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
13 years 11 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...
ACSW
2006
13 years 7 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt