Trust management applied to log access

dc.contributor.advisorSudsanguan Ngamsuriyaroj
dc.contributor.authorKhomdrad Boontae
dc.date.accessioned2024-02-13T02:59:46Z
dc.date.available2024-02-13T02:59:46Z
dc.date.copyright2007
dc.date.created2007
dc.date.issued2007
dc.descriptionComputer Science (Mahidol University 2007)
dc.description.abstractThe log file is the main instrument for recording all sequential events that have happened in any computer system. It contains the important records that can be used to investigate what abnormal behavior occurred in the past, and how it happened. Currently, log files of enterprise networks have several responsible administrators residing across departments in an organization. They have different roles and responsibilities as well. The security policy of the organization will identify who has the authorization to access which log file of all systems. How the authorization of accessing log files is designed and implemented would be a significant issue, and that would be our research focus. In this thesis, we designed and implemented a trusted framework for managing log file accesses in a distributed environment. The framework is enforced by the organization's security policy that specifies which administrators can access which log files at what time. The experimental results in the four sample scenarios show that the developed trusted framework would help us manage the log access authorization very well.
dc.format.extentxiv, 124 leaves : ill.
dc.format.mimetypeapplication/pdf
dc.identifier.citationThesis (M.Sc. (Computer Science))--Mahidol University, 2007
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/96958
dc.language.isoeng
dc.publisherMahidol University. Mahidol University Library and Knowledge Center
dc.rightsผลงานนี้เป็นลิขสิทธิ์ของมหาวิทยาลัยมหิดล ขอสงวนไว้สำหรับเพื่อการศึกษาเท่านั้น ต้องอ้างอิงแหล่งที่มา ห้ามดัดแปลงเนื้อหา และห้ามนำไปใช้เพื่อการค้า
dc.rights.holderMahidol University
dc.subjectComputer security
dc.subjectComputer networks -- Security measures
dc.subjectPublic key cryptography
dc.subjectTrust
dc.titleTrust management applied to log access
dc.title.alternativeการจัดการความน่าเชื่อถือที่ประยุกต์ใช้กับการเข้าถึงข้อมูลที่บันทึกระบบ
dc.typeMaster Thesis
dcterms.accessRightsopen access
mods.location.urlhttp://mulinet11.li.mahidol.ac.th/e-thesis/4537066.pdf
thesis.degree.departmentFaculty of Science
thesis.degree.disciplineComputer Science
thesis.degree.grantorMahidol University
thesis.degree.levelMaster's degree
thesis.degree.nameMaster of Science

Files