DocumentCode :
1256656
Title :
How to Do Application Logging Right
Author :
Chuvakin, Anton ; Peterson, Gunnar
Volume :
8
Issue :
4
fYear :
2010
Firstpage :
82
Lastpage :
85
Abstract :
As threats shift toward applications and as more companies struggle with compliance mandates and the limitation of protection technologies such as access control, the need for useful, comprehensive application logging can only increase. This article provides guidance on application logging to application developers and architects and to security professionals.
Keywords :
security of data; access control; application logging right; comprehensive application logging; protection technology; security professionals; Access control; Application virtualization; Cloud computing; Computer crime; Computer security; Protection; Security; application logging; audit logs; cloud computing; debugging logs; security and privacy;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2010.127
Filename :
5523872
Link To Document :
بازگشت