Title :
How to Do Application Logging Right
Author :
Chuvakin, Anton ; Peterson, Gunnar
Abstract :
As threats shift toward applications and as more companies struggle with compliance mandates and the limitation of protection technologies such as access control, the need for useful, comprehensive application logging can only increase. This article provides guidance on application logging to application developers and architects and to security professionals.
Keywords :
security of data; access control; application logging right; comprehensive application logging; protection technology; security professionals; Access control; Application virtualization; Cloud computing; Computer crime; Computer security; Protection; Security; application logging; audit logs; cloud computing; debugging logs; security and privacy;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2010.127