Issue No.04 - July/August (2010 vol.8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.127
As threats shift toward applications and as more companies struggle with compliance mandates and the limitation of protection technologies such as access control, the need for useful, comprehensive application logging can only increase. This article provides guidance on application logging to application developers and architects and to security professionals.
application logging, audit logs, debugging logs, cloud computing, security and privacy
Anton Chuvakin, "How to Do Application Logging Right", IEEE Security & Privacy, vol.8, no. 4, pp. 82-85, July/August 2010, doi:10.1109/MSP.2010.127