{"id":"https://openalex.org/W2087917109","doi":"https://doi.org/10.1145/2600176.2600183","title":"Log your CRUD","display_name":"Log your CRUD","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2087917109","doi":"https://doi.org/10.1145/2600176.2600183","mag":"2087917109"},"language":"en","primary_location":{"id":"doi:10.1145/2600176.2600183","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019402724","display_name":"Jason King","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jason King","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028171895","display_name":"Laurie Williams","orcid":"https://orcid.org/0000-0003-3300-6540"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurie Williams","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019402724"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":2.3667,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91131166,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7466753125190735},{"id":"https://openalex.org/keywords/logging","display_name":"Logging","score":0.7301976084709167},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.505669355392456},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4857538342475891},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.45717719197273254},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4561050534248352},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4503171443939209},{"id":"https://openalex.org/keywords/exploratory-research","display_name":"Exploratory research","score":0.4351538419723511},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3322497010231018},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15969276428222656},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09938585758209229}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7466753125190735},{"id":"https://openalex.org/C125620115","wikidata":"https://www.wikidata.org/wiki/Q845249","display_name":"Logging","level":2,"score":0.7301976084709167},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.505669355392456},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4857538342475891},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.45717719197273254},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4561050534248352},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4503171443939209},{"id":"https://openalex.org/C85973986","wikidata":"https://www.wikidata.org/wiki/Q1091731","display_name":"Exploratory research","level":2,"score":0.4351538419723511},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3322497010231018},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15969276428222656},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09938585758209229},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600176.2600183","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1604658196","https://openalex.org/W2060003048","https://openalex.org/W2065076704","https://openalex.org/W2095881341","https://openalex.org/W2162739315","https://openalex.org/W2164868210","https://openalex.org/W2199970174","https://openalex.org/W2620229640","https://openalex.org/W6602130902"],"related_works":["https://openalex.org/W2373969208","https://openalex.org/W2578023326","https://openalex.org/W2800852182","https://openalex.org/W2177102068","https://openalex.org/W60557881","https://openalex.org/W1972416716","https://openalex.org/W2129700183","https://openalex.org/W2945389153","https://openalex.org/W153262387","https://openalex.org/W2348000104"],"abstract_inverted_index":{"According":[0],"to":[1,98,130,167,171,226,247,251],"a":[2,30,44,235],"2011":[3],"survey":[4],"in":[5,38,49,65,112],"healthcare,":[6],"the":[7,50,80,87,100,121,157,180,189,249],"most":[8],"commonly":[9],"reported":[10],"breaches":[11],"of":[12,22,35,67,76,90,94,103,124,140,160,174,188,224,237,255],"protected":[13,213],"health":[14,144],"information":[15],"involved":[16],"employees":[17],"snooping":[18],"into":[19],"medical":[20],"records":[21],"friends":[23],"and":[24,73,153],"relatives.":[25],"Logging":[26],"mechanisms":[27,54,78,105,118,246],"can":[28],"provide":[29],"means":[31],"for":[32],"forensic":[33],"analysis":[34],"user":[36,45,58,68,201,256],"activity":[37],"software":[39,81],"systems":[40,199],"by":[41,106,119,219],"proving":[42],"that":[43,211,239],"performed":[46],"certain":[47],"actions":[48],"system.":[51,186],"However,":[52],"logging":[53,77,104,117,147,245],"often":[55,216],"inconsistently":[56],"capture":[57,252],"interactions":[59,202],"with":[60,203],"sensitive":[61,175,204],"data,":[62],"creating":[63],"gaps":[64],"traces":[66,254],"activity.":[69,257],"Explicit":[70],"design":[71],"principles":[72,238],"systematic":[74],"testing":[75],"within":[79],"development":[82],"lifecycle":[83],"may":[84],"help":[85],"strengthen":[86],"overall":[88],"security":[89],"software.":[91],"The":[92],"objective":[93],"this":[95],"research":[96],"is":[97,215],"observe":[99],"current":[101],"state":[102],"performing":[107],"an":[108,136],"exploratory":[109,137],"case":[110,138],"study":[111,139],"which":[113],"we":[114,233],"systematically":[115],"evaluate":[116],"supplementing":[120],"expected":[122,158],"results":[123,159],"existing":[125],"functional":[126],"black-box":[127],"test":[128,165,181,192],"cases":[129,166,182,193],"include":[131,168],"log":[132,169],"output.":[133],"We":[134,155,177,209],"perform":[135],"four":[141,197],"open-source":[142],"electronic":[143],"record":[145],"(EHR)":[146],"mechanisms:":[148],"OpenEMR,":[149],"OSCAR,":[150],"Tolven":[151],"eCHR,":[152],"WorldVistA.":[154],"supplement":[156],"30":[161,190],"United":[162],"States":[163],"government-sanctioned":[164],"output":[170],"track":[172],"access":[173],"data.":[176],"then":[178],"execute":[179],"on":[183,195,230],"each":[184],"EHR":[185,198],"Six":[187],"(20%)":[191],"failed":[194],"all":[196],"because":[200],"data":[205,214,225],"are":[206],"not":[207,217],"logged.":[208],"find":[210],"viewing":[212],"logged":[218],"default,":[220],"allowing":[221],"unauthorized":[222],"views":[223],"go":[227],"undetected.":[228],"Based":[229],"our":[231],"results,":[232],"propose":[234],"set":[236],"developers":[240],"should":[241],"consider":[242],"when":[243],"developing":[244],"ensure":[248],"ability":[250],"adequate":[253]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
