Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security auditing - fear of detection -vs- fear of detecting

Security auditing - fear of detection -vs- fear of detecting It's amazing how far technology has come since the invention of the Frankenstein monster. Not long ago I read about a prototype of a new kind of secure personal computer (PC). This machine was so secure that, for one user, it could generate 135 million bytes of audit data per day. My first reaction on reading this was to think that any actual information hidden in that audit data would certainly be secure. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Security auditing - fear of detection -vs- fear of detecting

ACM SIGSAC Review , Volume 7 (1) – Feb 1, 1989

Loading next page...
 
/lp/association-for-computing-machinery/security-auditing-fear-of-detection-vs-fear-of-detecting-1K3HOC3XtK
Publisher
Association for Computing Machinery
Copyright
Copyright © 1989 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/70951.70955
Publisher site
See Article on Publisher Site

Abstract

It's amazing how far technology has come since the invention of the Frankenstein monster. Not long ago I read about a prototype of a new kind of secure personal computer (PC). This machine was so secure that, for one user, it could generate 135 million bytes of audit data per day. My first reaction on reading this was to think that any actual information hidden in that audit data would certainly be secure.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Feb 1, 1989

There are no references for this article.