Design and Implementation of Verifiable Audit Trails for a Versioning File System
نویسندگان
چکیده
We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Digital audit trails create an analog of the paper audit process for file data, helping to meet the requirements of electronic records legislation. Our techniques address the I/O and computational efficiency of generating and verifying audit trails, the aggregation of audit information in directory hierarchies, and independence to file system architectures.
منابع مشابه
The Voter Verifiable Audio Audit Transcript Trail (vvaatt)
A multidisciplinary , collaborative project of 1. Introduction The debate about verifiable voter audit trails has prematurely narrowed into two camps: those who categorically deny the need for any backup records and those who advocate the Voter Verifiable Paper Audit Trail (VVPAT). As jurisdictions and watchdog groups prepare to define their election processes we should consider all alternatives.
متن کاملDesign and Implementation of a Fuzzy Intelligent System for Predicting Mortality in Trauma Patients in the Intensive Care Unit
Introduction: The intensive care unit is one of the most costly parts of the national health sector. These costs are largely attributable to the length of stay in the intensive care unit. For this reason, there are significant benefits in predicting patients' length of stay and the percentage of deaths in intensive care units. Therefore, in this study, a fuzzy logic based intelligent system was...
متن کاملA Network Audit System for Host-based Intrusion Detection (NASHID) CERIAS
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system calls or application sources, operations in the network protocol stack go unaudited. Earlier work has determined the audit data needed to detect low-level network attacks. In this paper we describe an implementation of a...
متن کاملDesign and Implementation of a Fuzzy Intelligent System for Predicting Mortality in Trauma Patients in the Intensive Care Unit
Introduction: The intensive care unit is one of the most costly parts of the national health sector. These costs are largely attributable to the length of stay in the intensive care unit. For this reason, there are significant benefits in predicting patients' length of stay and the percentage of deaths in intensive care units. Therefore, in this study, a fuzzy logic based intelligent system was...
متن کاملAnalyzing Audit Trails in the Aeolus Security Platform
This thesis presents the design and implementation of an analysis system for audit trails generated by Aeolus, a distributed security platform based on information flow control. Previous work focused on collecting these audit trails in the form of event logs. This thesis presents a model for representing these events and a system for analyzing them. In addition to allowing users to issue SQL qu...
متن کامل