skip to main content
10.1145/1533057.1533105acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Logging key assurance indicators in business processes

Published:10 March 2009Publication History

ABSTRACT

Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well-publicised major recent disasters (such as Barings, AllFirst-Allied Irish Bank, ENRON, Societé Generale) have shown, this assumption is not well-founded. Intermediate managers can misrepresent the actual state of their systems in order to hide negative events or to "doctor" reports which have been already produced. Existing security approaches which guarantee integrity of logs and related reports do not protect the system against these threats, if they are directly applied to a multi-layered corporate structure. In this paper, we extend existing approaches by constructing a logging scheme which ensures that, at each level, logs are both correct and consistent.

References

  1. Basel Committee on Banking Supervision, International convergence of capital measurement and capital standards, 2006.Google ScholarGoogle Scholar
  2. M. Bellare and S. Miner, A forward-secure digital signature scheme, CRYPTO'99, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Bellare and B. Yee, Forward integrity for secure audit logs, UCSD Technical Report, University of California at San Diego, 1997.Google ScholarGoogle Scholar
  4. C. Chong, Z. Peng and P. Hartel, Secure audit logging with tamper resistant hardware, Technical Report TR-CTIT-02-29, Univ. of Twente, 2002.Google ScholarGoogle Scholar
  5. D. Ma and G. Tsudik, A new approach to secure logging, IFIP DBSEC'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fox Business, Futures trader responsible for $7b fraud. http://www.foxbusiness.com.Google ScholarGoogle Scholar
  7. J. Holt, Logcrypt: forward security and public verification for secure audit logs, AusGrid'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ISACA, CobiT, www.isaca.org/cobit/, 2008.Google ScholarGoogle Scholar
  9. ISO/IEC. ISO 17799, 2001 IT Governance Institute, IT Control Objectives for BASEL II: The important of Goverance and Risk Management for Complience., 2007. http://www.isaca.org Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. IT Governance Institute. IT Control Objectives for BASEL II. The important of Goverance and Risk Management for Complience., 2007. http://www.isaca.org Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Kelsey and B. Schneier, Minimizing bandwidth for remote access to cryptographically protected audit logs, RAID'99, 1999.Google ScholarGoogle Scholar
  12. Permanent Subcommettee on Inverstigations of the Comittee on Governmental Affairs of the United States Senate, The Role of The Board of Directors in Enron's Collapse, http://news.findlaw.com/hdocs/docs/enron/senpsi70802rpt.pdf, 2002.Google ScholarGoogle Scholar
  13. B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, USENIX Security Symposium, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Schneier and J. Kelsy, Secure audit logs to support computer forensics, ACM TISSEC, Vol. 2, No. 2, pp. 159--176, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. United States Districs Court Southern Districs of New York, United States of America vs. Bernard J. Ebbers, http://news.findlaw.com/hdocs/docs/worldcom/usebbers504ind3s.pdf, 2004.Google ScholarGoogle Scholar
  16. Wachtell, Lipton, Rosen and Katz, Report to the Board of Allied Irish Banks, p.l.c., Allfirst Financial Inc. and Allfirst Bank Concerning Currency Trading Losses. Available from http://www.aibgroup.com, March 2002.Google ScholarGoogle Scholar
  17. B. Waters, D. Balfanz, G. Durfee and D. Smetters, Building an encrypted and searchable audit log, ISOC NDSS'04, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Logging key assurance indicators in business processes

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
                  March 2009
                  408 pages
                  ISBN:9781605583945
                  DOI:10.1145/1533057

                  Copyright © 2009 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 10 March 2009

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate358of1,940submissions,18%
                • Article Metrics

                  • Downloads (Last 12 months)4
                  • Downloads (Last 6 weeks)0

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader