Sciweavers

191 search results - page 39 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
114
Voted
SAC
2011
ACM
14 years 2 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty