[PDF][PDF] An Implementation Model for Correct Audit Logging in Cyber-Physical Systems
S Amir-Mohammadian, AY Zowj - sepehram.github.io
The widespread presence of cyber-physical systems necessitates a reliable assurance
mechanism for audit logging across various discrete and continuous components of these …
mechanism for audit logging across various discrete and continuous components of these …
[PDF][PDF] Correct audit logging in concurrent systems (technical report)
S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
Correct audit logging in concurrent systems
S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
Towards concurrent audit logging in microservices
S Amir-Mohammadian, AY Zowj - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Information-algebraic models have been shown as effective semantic frameworks in the
specification of audit logging requirements. These semantic frameworks underlie …
specification of audit logging requirements. These semantic frameworks underlie …
The meaning of logs
While logging events is becoming increasingly common in computing, in communication
and in collaborative environments, log systems need to satisfy increasingly challenging (if …
and in collaborative environments, log systems need to satisfy increasingly challenging (if …
Forensic analysis of logs: Modeling and verification
Information stored in logs of a computer system is of crucial importance to gather forensic
evidence of investigated actions or attacks against the system. Analysis of this information …
evidence of investigated actions or attacks against the system. Analysis of this information …
[PDF][PDF] SPECIFICATION FOR AUDIT TRAIL IN OIML D31: TOWARD RUNTIME VERIFICATION
H Watanabea - imeko.org
In general, manually checking a system log does not scale up, if the log becomes large. The
problem also arises the case with checking an audit trail in verification of a measuring …
problem also arises the case with checking an audit trail in verification of a measuring …
A generic model and architecture for automated auditing
Hasan, B Stiller - Ambient Networks: 16th IFIP/IEEE International …, 2005 - Springer
Research has been performed in areas of auditing, ao security auditing, compliance
auditing, financial auditing. In order to increase the efficiency of and to allow for continuous …
auditing, financial auditing. In order to increase the efficiency of and to allow for continuous …
A developer's guide to audit logging
J Margulies - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Modern enterprises centrally monitor their systems by collecting logs using audit reduction
tools that can search, sort, and alert. The author describes how developers can support such …
tools that can search, sort, and alert. The author describes how developers can support such …
Incorporating policy-based authorization framework in audit rule ontology for continuous process auditing in complex distributed systems
N Subhani, R Kent - On the Move to Meaningful Internet Systems: OTM …, 2014 - Springer
Complex distributed information systems that run their activities in the form of processes
require continuous auditing of a process that invokes the action (s) specified in the policies …
require continuous auditing of a process that invokes the action (s) specified in the policies …