2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.24
|View full text |Cite
|
Sign up to set email alerts
|

Evidence-Based Audit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(34 citation statements)
references
References 21 publications
0
34
0
Order By: Relevance
“…Finally, a set of approaches [25][26][27][28] used by the database community to support similar security properties as the ones presented in this paper can complement our work. Even these approaches were not created to specifically protect provenance information, the solutions presented to solve security issues (such as privacy) can be adapted to be implemented in the presented provenance model.…”
Section: Related Workmentioning
confidence: 86%
“…Finally, a set of approaches [25][26][27][28] used by the database community to support similar security properties as the ones presented in this paper can complement our work. Even these approaches were not created to specifically protect provenance information, the solutions presented to solve security issues (such as privacy) can be adapted to be implemented in the presented provenance model.…”
Section: Related Workmentioning
confidence: 86%
“…There is also work on authorisation and enforcement of rules in databases [14,4,8]. However, given the openness of information on the Web and the possibility of inferring information using previously published information, authorisation and enforcement are very challenging to implement.…”
Section: Algorithm 3 Reusing Datamentioning
confidence: 99%
“…Some research [14,4,8] is focused on developing better techniques to avoid information misuse by restricting access to information. However, access restriction alone cannot properly solve this problem on the Web, where information is widely and public available.…”
Section: Introductionmentioning
confidence: 99%
“…That is the focus of this paper. Other work has focused on formalisms for querying logs [39,18], however these works presuppose correctness of audit logs for true accountability.…”
Section: A Motivating Example From Practicementioning
confidence: 99%