Extracting security control requirements
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
BBox: a distributed secure log architecture
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Measuring the forensic-ability of audit logs for nonrepudiation
Proceedings of the 2013 International Conference on Software Engineering
International Journal of Web Services Research
Hi-index | 0.00 |
In today's age of Web applications connected via Web services, accountability has become both crucial and harder to achieve. The management of authentication, authorization, and accountability in these applications is therefore a very important and difficult problem to solve. In this installment of Building Security In, the authors describe how audit logging can be built into the Web services infrastructure.