• DocumentCode
    564689
  • Title

    The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security

  • Author

    Bonyun, David

  • Author_Institution
    I.P. SHARP ASSOCIATES LIMITED
  • fYear
    1981
  • fDate
    27-29 April 1981
  • Firstpage
    19
  • Lastpage
    19
  • Abstract
    Financial people have advocated, and even demanded an auditing process within computers so that trails could be analyzed. Both security and privacy, likewise, can make great use of the same type of logging activity. This paper considers several issues with respect to such activity; but perhaps the most fundamental idea is that a single, unified, well-designed logging process has a wide variety of possible uses, and these ought all to be given weight during the design phase. Audit trails form a significant part of the detective mechanisms for data security, and they are essential in the case of computer records dealing with human subjects when privacy is at stake.
  • Keywords
    Computers; Data security; Kernel; Monitoring;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1981 IEEE Symposium on
  • Conference_Location
    Oakland, CA, USA
  • ISSN
    1540-7993
  • Print_ISBN
    0-8186-0345-3
  • Type

    conf

  • DOI
    10.1109/SP.1981.10002
  • Filename
    6234397