Sudsanguan NgamsuriyarojKhomdrad Boontae2024-02-132024-02-13200720072007Thesis (M.Sc. (Computer Science))--Mahidol University, 2007https://repository.li.mahidol.ac.th/handle/20.500.14594/96958Computer Science (Mahidol University 2007)The log file is the main instrument for recording all sequential events that have happened in any computer system. It contains the important records that can be used to investigate what abnormal behavior occurred in the past, and how it happened. Currently, log files of enterprise networks have several responsible administrators residing across departments in an organization. They have different roles and responsibilities as well. The security policy of the organization will identify who has the authorization to access which log file of all systems. How the authorization of accessing log files is designed and implemented would be a significant issue, and that would be our research focus. In this thesis, we designed and implemented a trusted framework for managing log file accesses in a distributed environment. The framework is enforced by the organization's security policy that specifies which administrators can access which log files at what time. The experimental results in the four sample scenarios show that the developed trusted framework would help us manage the log access authorization very well.xiv, 124 leaves : ill.application/pdfengผลงานนี้เป็นลิขสิทธิ์ของมหาวิทยาลัยมหิดล ขอสงวนไว้สำหรับเพื่อการศึกษาเท่านั้น ต้องอ้างอิงแหล่งที่มา ห้ามดัดแปลงเนื้อหา และห้ามนำไปใช้เพื่อการค้าComputer securityComputer networks -- Security measuresPublic key cryptographyTrustTrust management applied to log accessการจัดการความน่าเชื่อถือที่ประยุกต์ใช้กับการเข้าถึงข้อมูลที่บันทึกระบบMaster ThesisMahidol University