Abstract
In this paper we investigate the illicit means of leaking sensitive or private information in operating systems. The leakage cannot be eliminated either by the use of access control and authentication mechanisms or by administrative measures since unauthorized access need not be attempted. In order to resolve the problem, we designed an audit system which is able to detect the illicit leakage of information. This audit system consists of two major components: an enhanced audit-collection mechanism and an audit-analysis tool.
Original language | English |
---|---|
Pages (from-to) | 123-148 |
Number of pages | 26 |
Journal | Journal of Computer Security |
Volume | 4 |
Issue number | 2-3 |
DOIs | |
State | Published - 1 Jan 1996 |