[PDF][PDF] An Implementation Model for Correct Audit Logging in Cyber-Physical Systems

S Amir-Mohammadian, AY Zowj - sepehram.github.io
The widespread presence of cyber-physical systems necessitates a reliable assurance
mechanism for audit logging across various discrete and continuous components of these …

[PDF][PDF] Correct audit logging in concurrent systems (technical report)

S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

Correct audit logging in concurrent systems

S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

Towards concurrent audit logging in microservices

S Amir-Mohammadian, AY Zowj - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Information-algebraic models have been shown as effective semantic frameworks in the
specification of audit logging requirements. These semantic frameworks underlie …

The meaning of logs

S Etalle, F Massacci, A Yautsiukhin - Trust, Privacy and Security in Digital …, 2007 - Springer
While logging events is becoming increasingly common in computing, in communication
and in collaborative environments, log systems need to satisfy increasingly challenging (if …

Forensic analysis of logs: Modeling and verification

M Saleh, AR Arasteh, A Sakha, M Debbabi - Knowledge-Based Systems, 2007 - Elsevier
Information stored in logs of a computer system is of crucial importance to gather forensic
evidence of investigated actions or attacks against the system. Analysis of this information …

[PDF][PDF] SPECIFICATION FOR AUDIT TRAIL IN OIML D31: TOWARD RUNTIME VERIFICATION

H Watanabea - imeko.org
In general, manually checking a system log does not scale up, if the log becomes large. The
problem also arises the case with checking an audit trail in verification of a measuring …

A generic model and architecture for automated auditing

Hasan, B Stiller - Ambient Networks: 16th IFIP/IEEE International …, 2005 - Springer
Research has been performed in areas of auditing, ao security auditing, compliance
auditing, financial auditing. In order to increase the efficiency of and to allow for continuous …

A developer's guide to audit logging

J Margulies - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Modern enterprises centrally monitor their systems by collecting logs using audit reduction
tools that can search, sort, and alert. The author describes how developers can support such …

Incorporating policy-based authorization framework in audit rule ontology for continuous process auditing in complex distributed systems

N Subhani, R Kent - On the Move to Meaningful Internet Systems: OTM …, 2014 - Springer
Complex distributed information systems that run their activities in the form of processes
require continuous auditing of a process that invokes the action (s) specified in the policies …