Skip to main content
Log in

Revisionssichere Protokollierung in Standardbetriebssystemen

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Protokolldateien lassen sich sehr einfach erzeugen, aber auch verändern, unterdrücken und löschen. Die in Stadard-Betriebssystemen und Anwendungsprogrammen vorhandenen Schutzmechanismen sind unzureichend und müssen ergänzt und erweitert werden, um den wachsenden Anforderungen und der Kritikalität der Protokolldaten Rechnung zu tragen. Der Autor betrachtet die technischen und organisatorischen Anforderungen an eine revisionssichere und manipulationsgesicherte Sammlung von Protokolldaten und weist auf die Rahmenbedingungen hin, die bei der Realisierung der Anforderungen in Protokollarchitekturen für Standardbetriebssystemen zu berücksichtigen sind.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. AHN, G.-J., AND SANDHU, R. S. The RSL99 Language for Role-Based Separation of Duty Constraints. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (RBAC 1999) (Fairfax, VA, USA, Oct. 1999), ACM Press, pp. 43–54.

  2. ARNOLD, M., SCHMUCKER, M., AND WOLTHUSEN, S. D. Techniques and Applications of Digital Watermarking and Content Protection. The Artech House Computer Security Series. Artech House, Norwood, MA, USA, 2003.

  3. BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (Bolton Landing, NY, USA, Oct. 2003), ACM Press, pp. 164–177.

  4. Busch, C., and Wolthusen, S. D. Netzwerksicherheit. Spektrum Akademischer Verlag, Heidelberg, 2002.

    MATH  Google Scholar 

  5. COMMON CRITERIA IMPLEMENTATION AND MAINTENANCE BOARD. Common Criteria for Information Technology Security Evaluation: Part 2: Security Functional Components. Common Criteria Implementation and Maintenance Board, Cheltenham, Glos, UK, 2005. Version 3.0, Revision 2, CCMB document 2005-07-002.

  6. FERRAIOLO, D. F., KUHN, D. R., AND CHANDRAMOULI, R. Role-Based Access Control. The Artech House Computer Security Series. Artech House, Norwood, MA, USA, 2003.

  7. Mercuri, R. T. On Auditing Audit Trails. Communications of the Association for Computing Machinery 46, 1 (Jan. 2003), 17–20.

    Google Scholar 

  8. PICCIOTTO, J. The Design of an Effective Auditing Subsystem. In Proceedings of the 1987 IEEE Symposium on Security and Privacy (Oakland, CA, USA, Apr. 1987), IEEE Press, pp. 13–22.

  9. Schneier, B., and Kelsey, J. Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security 2, 2 (May 1999), 159–176.

    Article  Google Scholar 

  10. UNITED STATES DEPARTMENT OF DEFENSE DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (1985).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wolthusen, S.D. Revisionssichere Protokollierung in Standardbetriebssystemen. DuD 30, 281–284 (2006). https://doi.org/10.1007/s11623-006-0084-7

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-006-0084-7