Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Tracking potential security violations

Tracking potential security violations Security concerns not only involve providing restricted access to computer resources, but frequently require investigative studies to track suspicious utilization for potential company violations. For such studies it is important to have pertinent information for the entire job in order to trace what is being done. Sometimes very little information is available to use as a key for isolating the jobs in question. This paper describes a tool developed at Union Carbide Corp. to enhance such investigations on IBM MVS systems. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Tracking potential security violations

ACM SIGSAC Review , Volume 1 (1) – Dec 31, 1981

Loading next page...
 
/lp/association-for-computing-machinery/tracking-potential-security-violations-ZCqA69HDuV
Publisher
Association for Computing Machinery
Copyright
Copyright © 1981 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/1317419.1317423
Publisher site
See Article on Publisher Site

Abstract

Security concerns not only involve providing restricted access to computer resources, but frequently require investigative studies to track suspicious utilization for potential company violations. For such studies it is important to have pertinent information for the entire job in order to trace what is being done. Sometimes very little information is available to use as a key for isolating the jobs in question. This paper describes a tool developed at Union Carbide Corp. to enhance such investigations on IBM MVS systems.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Dec 31, 1981

There are no references for this article.