Towards Hippocratic Log Files

نویسنده

  • Andrew Rutherford
چکیده

The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make the Internet a treasure trove of personal information regarding individual Web users. This has lead to internet users voicing concerns over the loss and violation of privacy. Inspired by the Hippocratic Oath, Agrawal, Kiernan, Srikant, and Xu (2002) introduced the concept of Hippocratic database systems. A founding tenet of such systems is that they should be responsible for the privacy of data they manage. Ten principles of Hippocratic database systems have been defined. The primary focus of this paper is to determine to which extent these same principles can be applied to log files. Once this is done, an architecture for the implementation of Hippocratic log files is introduced and discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Hippocratic Log File Architecture

The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium, combine to make the Internet a treasure trove of personal information regarding individual Web users. Users’ movements and information are logged as they navigate the Web, often without their knowledge and definitely without their ex...

متن کامل

Fast and Efficient Log File Compression

Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system services and utilities) for multiple purposes (e.g., maintenance, security issues, traffic analysis, legal requirements, software debugging, customer management, user interface usability studies). Log files in complex s...

متن کامل

LOGDIG log file analyzer for mining expected behavior from log files

Log files are often the only way to identify and locate errors in a deployed system. This paper presents a new log file analyzing framework, LOGDIG, for checking expected system behavior from log files. LOGDIG is a generic framework, but it is motivated by logs that include temporal data (timestamps) and system-specific data (e.g. spatial data with coordinates of moving objects), which are pres...

متن کامل

GUITESTER: A Log-Based Usability Testing Tool for Graphical User Interfaces

In this paper, we propose methods for testing the usability of graphical user interface (GUI) applications based on log files of user interactions. Log analysis by existing methods is not efficient because evaluators analyze a single log file or log files of the same user and then manually compare results. The methods proposed here solve this problem; the methods enable evaluators to analyze th...

متن کامل

Analysis of Web Logs and Web User in Web Mining

Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion about these log files, their formats, their creation, access procedures, their us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004