Evidence of log integrity in policy-based security monitoring.
Mirko MontanariJun Ho HuhDerek DagitRakesh BobbaRoy H. CampbellPublished in: DSN Workshops (2012)
Keyphrases
- high assurance
- trusted computing
- data integrity
- information flow control
- integrity verification
- monitoring system
- network monitoring
- real time
- security issues
- trust negotiation
- data security
- information security
- data confidentiality
- optimal policy
- data protection
- network management
- security requirements
- policy enforcement
- information flow
- intrusion detection
- functional requirements
- access control
- computer security
- security protocols
- security level
- human operators
- security analysis
- key management
- security policies
- data storage
- distributed databases
- privacy preserving
- operating system
- distributed systems
- database systems
- information systems