Preventative countermeasures and accountability are two complementary approaches to address computer security. Preventative countermeasures have been the primary approach in practice and in research. Real-world experiences from dealing with security indicate that accountability is not only complement to preventative countermeasures, but also necessary, in particular, when online privacy becomes a growing concern to individuals and societies at the advent of sophisticated cross-site referencing tools and algorithms. The primary object is thus to build accountable systems and networks to address real-word computer security.
Related Publications
2019
Prototyping Flow-net Logging for Accountability Management in Linux Operating Systems for IoTs
@article{8813093,author={Xiao, Yang and Zeng, Lei and Chen, Hui and Li, Tieshan},journal={IEEE Access},title={Prototyping Flow-net Logging for Accountability Management in Linux Operating Systems for IoTs},year={2019},volume={},number={},pages={1-1},keywords={Linux;Access control;Kernel;Internet of Things;Computer security;Computer Security;Accountability;Logging;Auditing;Flow-net;IoT},doi={10.1109/ACCESS.2019.2937637},issn={2169-3536},month={}}
2018
FNF: Flow-net based fingerprinting and its applications
@article{FU2018167,title={{FNF}: Flow-net based fingerprinting and its applications},journal={Computers \& Security},volume={75},pages={167 - 181},month=jun,year={2018},issn={0167-4048},doi={https://doi.org/10.1016/j.cose.2018.02.005},url={http://www.sciencedirect.com/science/article/pii/S0167404818300877},author={Fu, Bo and Xiao, Yang and Chen, Hui},keywords={Flow-net, Logging, Fingerprint, Intrusion detection, Computer networks, Computer systems}}
2017
Accountable Administration in Operating Systems
Lei Zeng, Hui Chen, and Yang Xiao
International Journal of Information and Computer Security, Jun 2017
@article{zeng2017accountable,author={Zeng, Lei and Chen, Hui and Xiao, Yang},title={Accountable Administration in Operating Systems},journal={International Journal of Information and Computer Security},year={2017},volume={9},no={3},pages={157--179},doi={10.1504/IJICS.2017.10005900},url={https://dx.doi.org/10.1504/IJICS.2017.10005900},publisher={Indersciene}}
2016
Computer operating system logging and security issues: a survey
@article{ZENG_SEC1677,author={Zeng, Lei and Xiao, Yang and Chen, Hui and Sun, Bo and Han, Wenlin},title={Computer operating system logging and security issues: a survey},journal={Security and Communication Networks},volume={9},number={17},issn={1939-0122},url={https://dx.doi.org/10.1002/sec.1677},doi={10.1002/sec.1677},pages={4804--4821},keywords={logging, operating system, Linux, Unix, security},year={2016}}
2015
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux
@article{ZENG_SEC1277,author={Zeng, Lei and Xiao, Yang and Chen, Hui},title={Auditing overhead, auditing adaptation, and benchmark evaluation in {Linux}},journal={Security and Communication Networks},volume={8},number={18},issn={1939-0122},url={https://dx.doi.org/10.1002/sec.1277},doi={10.1002/sec.1277},pages={3523--3534},keywords={logging, overhead, Linux, auditing},year={2015}}
2014
An Accountable Framework for Sensing-oriented Mobile Cloud Computing
@article{Xiaozf2014,title={An Accountable Framework for Sensing-oriented Mobile Cloud Computing},author={Xiao, Zhifeng and Xiao, Yang and Chen, Hui},journal={Journal of Internet technology},volume={15},number={5},pages={813 - 822},month=sep,year={2014},url={https://dx.doi.org/10.6138\%2fJIT.2014.15.5.11}}