2011
DOI: 10.1002/sec.407
|View full text |Cite
|
Sign up to set email alerts
|

Virtual flow‐net for accountability and forensics of computer and network systems

Abstract: Information/secret leaking cannot always be recorded in digital log files. In other words, in log files, not all information/events are recorded, and it is thus impossible to trace the paths of secret leaking on the basis of log files alone. In this paper, to resolve the difficulty of the lack of information, we utilize user–relationship graphs, or social networks, to compensate for the required information. We also utilize a probabilistic analysis to build virtual links to follow information flows. User–relat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 81 publications
0
3
0
Order By: Relevance
“…While accountability has been studied in other systems [124], [125], [126], [127], [128], [129], [130], [131], it is essential in order to build trust relationships in cloud environment [35], [47], [48], [50], [52], [88]. Accountability implies that the capability of identifying a party, with undeniable evidence, is responsible for specific events [124], [125], [126], [127], [128], [129], [130], [131].…”
Section: Cloud Accountabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…While accountability has been studied in other systems [124], [125], [126], [127], [128], [129], [130], [131], it is essential in order to build trust relationships in cloud environment [35], [47], [48], [50], [52], [88]. Accountability implies that the capability of identifying a party, with undeniable evidence, is responsible for specific events [124], [125], [126], [127], [128], [129], [130], [131].…”
Section: Cloud Accountabilitymentioning
confidence: 99%
“…While accountability has been studied in other systems [124], [125], [126], [127], [128], [129], [130], [131], it is essential in order to build trust relationships in cloud environment [35], [47], [48], [50], [52], [88]. Accountability implies that the capability of identifying a party, with undeniable evidence, is responsible for specific events [124], [125], [126], [127], [128], [129], [130], [131]. When dealing with cloud computing, there are multiple parties that may be involved; a cloud provider and its customers are the two basic ones, and the public clients who use applications (e.g., a web application) outsourced by cloud customers may be another party.…”
Section: Cloud Accountabilitymentioning
confidence: 99%
“…We also make fewer assumptions about the rate of the Poisson process, and the calculations are significantly simplified. Some other related work includes .…”
Section: Related Workmentioning
confidence: 99%