메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Accountable administration and implementation in operating systems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY MODEL; SYSTEM ADMINISTRATORS;

EID: 84863166638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2011.6134107     Document Type: Conference Paper
Times cited : (12)

References (29)
  • 3
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • DOI 10.1109/MCOM.2008.4481350
    • Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Communications Magazine, Vol. 46, No. 4, Apr. 2008, pp. 116-126. 10.1109/MCOM.2008.4481350 (Pubitemid 351593417)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 5
    • 4243139559 scopus 로고    scopus 로고
    • On auditing audit trails
    • January
    • Rebecca T. Mercuri, "On auditing audit trails," Communications of the ACM, vol. 46, no. 1, pp. 17-20, January, 2003
    • (2003) Communications of the ACM , vol.46 , Issue.1 , pp. 17-20
    • Mercuri, R.T.1
  • 7
    • 84863165936 scopus 로고    scopus 로고
    • SUSE Linux AG, SUSE Linux AG and Novell, Inc, 2004, see: September 28
    • SUSE Linux AG, "Linux Audit-Subsystem Design Documentation for Kernel 2.6, Version 0.1," SUSE Linux AG and Novell, Inc, 2004, see: http://www.uniforum.chi.il.us/slides/HardeningLinux/LAuS-Design.pdf, September 28, 2007.
    • (2007) Linux Audit-Subsystem Design Documentation for Kernel 2.6, Version 0.1
  • 10
  • 12
    • 84863165935 scopus 로고    scopus 로고
    • Common Criteria: Launching the International Standard
    • National Institute of Standard and Technology, Information Technology Laboratory, November Available
    • NIST ITL, "Common Criteria: Launching the International Standard," NIST ITL Security Bulletin, National Institute of Standard and Technology, Information Technology Laboratory, November 1998, Available: http://csrc.nist.gov/publications/nistbul/11-98.pdf
    • (1998) NIST ITL Security Bulletin
  • 13
    • 0003765587 scopus 로고    scopus 로고
    • The International Organization for Standardization, Version 3.1, September Available
    • The International Organization for Standardization, "Common Criteria for Information Technology Security Evaluation (CC)," Version 3.1, September 2006, Available: http://www.commoncriteriaportal.org/public/consumer/ index.php?menu=2.
    • (2006) Common Criteria for Information Technology Security Evaluation (CC)
  • 14
    • 84863165934 scopus 로고    scopus 로고
    • October 10, Available
    • Microsoft, "The Threats and Countermeasures Guide," October 10, 2007, Available: http://www.microsoft.com/technet/security/guidance/ serversecurity/tcg/tcgch00.mspx
    • (2007) The Threats and Countermeasures Guide
  • 15
    • 84863134922 scopus 로고    scopus 로고
    • October 10, Available
    • Microsoft, "The Audit Management in Windows 2000," October 10, 2007, Available: http://www.microsoft.com/technet/security/prodtech/windows2000/ w2kccadm/auditman/w2kadm22.mspx
    • (2007) The Audit Management in Windows 2000
  • 16
    • 84863137058 scopus 로고    scopus 로고
    • October 10, Available
    • Microsoft, "The Audit Collection Services," October 10, 2007, Available: http://technet.microsoft.com/enus/library/bb381258.aspx
    • (2007) The Audit Collection Services
  • 17
    • 84863137062 scopus 로고    scopus 로고
    • September 28, Available
    • Redhat, Inc, "Linux Audit Discussion," September 28, 2007 Available: http://www.redhat.com/mailman/listinfo/linux-audit
    • (2007) Linux Audit Discussion
  • 18
    • 0003951497 scopus 로고    scopus 로고
    • Sun Microsystems, Inc, Mountain View, CA 94303, USA, Available
    • Sun Microsystems, Inc, "SunSHIELD Basic Security Module Guide," Sun Microsystems, Inc, Mountain View, CA 94303, USA, 2000, Available: http://dlc.sun.com/pdf/806-1789/806-1789.pdf
    • (2000) SunSHIELD Basic Security Module Guide
  • 20
    • 0038223020 scopus 로고    scopus 로고
    • Technical Report, Department of Computer Science and Engineering, University of California at San Diego, November
    • M. Bellare and B. Yee, "Forward Integrity for Secure Audit Logs," Technical Report, Department of Computer Science and Engineering, University of California at San Diego, November, 1997.
    • (1997) Forward Integrity for Secure Audit Logs
    • Bellare, M.1    Yee, B.2
  • 21
    • 34250213398 scopus 로고    scopus 로고
    • A Policy-Driven Contact-Based Security Protocol for Protecting Audit Logs on Wireless Devices
    • September
    • W. Itani, A. Kayssi, A. Chehab, and C. Gaspard, "A Policy-Driven Contact-Based Security Protocol for Protecting Audit Logs on Wireless Devices," International Journal of Network Security, Vol. 3, No. 2, pp.124-135, September 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 124-135
    • Itani, W.1    Kayssi, A.2    Chehab, A.3    Gaspard, C.4
  • 22
    • 0031177289 scopus 로고    scopus 로고
    • Remote auditing of software outputs using a trusted coprocessor
    • PII S0167739X97000046
    • B. Schneier and J. Kelsey, "Remote Auditing of Software Outputs Using a Trusted Coprocessor," Future Generation Computer Systems, Vol. 13, No. 1, pp.9-18, July 1997. (Pubitemid 127382569)
    • (1997) Future Generation Computer Systems , vol.13 , Issue.1 , pp. 9-18
    • Schneier, B.1    Kelsey, J.2
  • 24
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic Support for Secure Logs on Untrusted Machines
    • Berkeley, CA, January
    • B. Schnerer and J. Kelsey, "Cryptographic Support for Secure Logs on Untrusted Machines," Proceedings of the 7th USENIX Security Symposium, pp.53-62, Berkeley, CA, January 1998.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 53-62
    • Schnerer, B.1    Kelsey, J.2
  • 28
    • 70350060199 scopus 로고    scopus 로고
    • Flow-Net Methodology for Accountability in Wireless Networks
    • Sept./Oct.
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.