The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
In this paper, we propose a quantifiable accountability in wireless networks. We present two methods to evaluate the accountable logging of a network via the users' accepted overhead (called Q-Accountable Logging by Overhead), and P-Accountable Logging. Q-Accountable Logging by Overhead is introduced first time in this work, and P-Accountable Logging derives from our previous work P-Accountability.
Many security models and systems are built upon the assumption that super users are trustworthy. However, it becomes challenging to hold super users accountable since they can erase any trace of their activities. This paper proposes an accountable administration model for operating systems where all system administrators can be accounted for even if they are untrustworthy. The model is implemented...
We propose EagleEye, an accountable logging framework as a middleware for distributed and networked systems. EagleEye offloads the logging function from the distributed application program so that applications can focus on the logic handling without worrying about when and how to do logging. By capturing and analyzing network packets, EagleEye is able to reproduce the entire networking event history...
In this paper, we propose an implementation scheme of flow-net which is designed to record events and their relations. Different implementation schemes of the flow-net are introduced and compared. Under the collaboration of the nodes in a network, all of the events in the network are recorded and the relations of the events can be clearly described by flow-net. Because of the clear description of...
In log files, not all information/events are recorded and it is thus impossible to trace the paths of secret leaking based on log files alone. In this paper, we utilize user-relationship-graphs, or social networks, to compensate for the required information. User-relationship-graphs are constructed from several flow-net data structures over a longer period so that we can avoid missing embedded threats...
In order to provide accountability, a better logging system is needed so that not only the activities but also their relationships are captured. To this end, our previous work proposed a novel logging mechanism, flow-net methodology, for accountability. In this paper, we extend the flow-net methodology and present its design and implementation in wireless networks. We also evaluate the performance...
In this paper, we explore a quantitative approach to accountable wireless multi-hop networks. We propose using hierarchical P-Accountability to adapt the requirements of modeling a complex network environment and assess the degree of accountability in a fine-grained manner. We have defined P-Accountability and demonstrated its use in the hierarchical network environment. In addition, we apply P-Accountability...
Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of larger chains of accountability. One of the goals of accountability is that once an event has transpired, the events that took place are traceable so that the causes can be determined afterward. The poor accountability provided by today's computers and networks wastes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.