Auditing with incomplete logs

@inproceedings{Mian2015AuditingWI,
  title={Auditing with incomplete logs},
  author={Us Umbreen Sabir Mian and den Ji Jerry Hartog and Sandro Etalle and Nicola Zannone},
  year={2015}
}
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy en-forcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove confor-mity to policies and detect policy violations when a valid explanation of confor-mity does not exist. However… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-2 OF 2 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

Policy auditing over incomplete logs: theory, implementation and applications

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Abductive Logic Programming

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Audit-based compliance control

  • International Journal of Information Security
  • 2007
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Controlling Break-the-Glass through Alignment

  • 2013 International Conference on Social Computing
  • 2013
VIEW 1 EXCERPT

Supporting Cloud Accountability by Collecting Evidence Using Audit Agents

  • 2013 IEEE 5th International Conference on Cloud Computing Technology and Science
  • 2013
VIEW 1 EXCERPT