DocumentCode
564689
Title
The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security
Author
Bonyun, David
Author_Institution
I.P. SHARP ASSOCIATES LIMITED
fYear
1981
fDate
27-29 April 1981
Firstpage
19
Lastpage
19
Abstract
Financial people have advocated, and even demanded an auditing process within computers so that trails could be analyzed. Both security and privacy, likewise, can make great use of the same type of logging activity. This paper considers several issues with respect to such activity; but perhaps the most fundamental idea is that a single, unified, well-designed logging process has a wide variety of possible uses, and these ought all to be given weight during the design phase. Audit trails form a significant part of the detective mechanisms for data security, and they are essential in the case of computer records dealing with human subjects when privacy is at stake.
Keywords
Computers; Data security; Kernel; Monitoring;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1981 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0345-3
Type
conf
DOI
10.1109/SP.1981.10002
Filename
6234397
Link To Document