1) La descarga del recurso depende de la página de origen
2) Para poder descargar el recurso, es necesario ser usuario registrado en Universia


Opción 1: Descargar recurso

Opción 2: Descargar recurso

Detalles del recurso

Descripción

Retrospective security has become increasingly important to the theory and practice of cyber security, with auditing a crucial component of it. However, in systems where auditing is used, programs are typically instrumented to generate audit logs using manual, ad-hoc strategies. This is a potential source of error even if log analysis techniques are formal, since the relation of the log itself to program execution is unclear. This paper focuses on provably correct program rewriting algorithms for instrumenting formal logging specifications. Correctness guarantees that the execution of an instrumented program produces sound and complete audit logs, properties defined by an information containment relation between logs and the program’s logging semantics. We also propose a program rewriting approach to instrumentation for audit log generation, in a manner that guarantees correct log generation even for untrusted programs. As a case study, we develop such a tool for OpenMRS, a popular medical records management system, and consider instrumentation of break the glass policies.

Pertenece a

Digital Access to Scholarship at Harvard  

Autor(es)

Amir -  Mohammadian, Sepehr -  Chong, Stephen N -  Skalka, Christian - 

Id.: 70835346

Idioma: inglés (Estados Unidos)  - 

Versión: 1.0

Estado: Final

Tipo de recurso: Journal Article  - 

Tipo de Interactividad: Expositivo

Nivel de Interactividad: muy bajo

Audiencia: Estudiante  -  Profesor  -  Autor  - 

Estructura: Atomic

Coste: no

Copyright: sí

: open

Requerimientos técnicos:  Browser: Any - 

Relación: [References] doi:10.1007/978-3-662-49635-0_8
[References] Lecture Notes in Computer Science

Fecha de contribución: 07-ene-2018

Contacto:

Localización:
* 0302-9743

Otros recursos del mismo autor(es)

  1. Employment 12 months after kidney transplantation: An in-depth bio-psycho-social analysis of the Swiss Transplant Cohort International audience
  2. Dispersion-controlled diffractive devices with dielectric metasurfaces Diffractive optical devices follow a negative chromatic dispersion dictated by device function. Here...
  3. Dielectric metasurfaces with independent angular control We introduce dielectric metasurfaces with independent response at different angles of incidence give...
  4. On problems in the calculus of variations in increasingly elongated domains We consider minimization problems in the calculus of variations set in a sequence of domains the siz...
  5. On Fienup Methods for Sparse Phase Retrieval International audience

Otros recursos de la mismacolección

  1. Gaze-Stabilizing Central Vestibular Neurons Project Asymmetrically to Extraocular Motoneuron Pools Within reflex circuits, specific anatomical projections allow central neurons to relay sensations to...
  2. Geochemical and mineralogical evidence that Rodinian assembly was unique The mineralogy and geochemistry associated with Rodinian assembly (~1.3–0.9 Ga) are significantly di...
  3. Plasmonic tunnel junctions for single-molecule redox chemistry Nanoparticles attached just above a flat metallic surface can trap optical fields in the nanoscale g...
  4. Reading and editing the Pleurodeles waltl genome reveals novel features of tetrapod regeneration Salamanders exhibit an extraordinary ability among vertebrates to regenerate complex body parts. How...
  5. Development of corticostriatal connectivity constrains goal-directed behavior during adolescence When pursuing high-value goals, mature individuals typically titrate cognitive performance according...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.