{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:42:59Z","timestamp":1725691379006},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","funder":[{"name":"USA National Security Agency (NSA) Science of Security Lablet"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600183","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Log your CRUD"],"prefix":"10.1145","author":[{"given":"Jason","family":"King","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Laurie","family":"Williams","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011 Survey of Patient Privacy Breaches. August 2011. Veriphyr Incorporated http:\/\/www.veriphyr.com\/landing\/HIPAA_violation_survey\/. 2011 Survey of Patient Privacy Breaches . August 2011. Veriphyr Incorporated http:\/\/www.veriphyr.com\/landing\/HIPAA_violation_survey\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2014 Edition Test Method. December 14 2012. The Office of the National Coordinator for Health Information Technology http:\/\/www.healthit.gov\/policy-researchers-implementers\/2014-edition-final-test-method. 2014 Edition Test Method . December 14 2012. The Office of the National Coordinator for Health Information Technology http:\/\/www.healthit.gov\/policy-researchers-implementers\/2014-edition-final-test-method."},{"key":"e_1_3_2_1_3_1","volume-title":"A Unified Event Language for Interoperability","author":"Common Event Expression","year":"2013","unstructured":"Common Event Expression : A Unified Event Language for Interoperability . 2013 . MITRE Corporation , http:\/\/cee.mitre.org. Common Event Expression: A Unified Event Language for Interoperability. 2013. MITRE Corporation, http:\/\/cee.mitre.org."},{"volume-title":"Information Exposure Through Log Files","year":"2013","key":"e_1_3_2_1_4_1","unstructured":"CWE-532 : Information Exposure Through Log Files . 2013 . The MITRE Corporation , http:\/\/cwe.mitre.org\/data\/definitions\/532.html. CWE-532: Information Exposure Through Log Files. 2013. The MITRE Corporation, http:\/\/cwe.mitre.org\/data\/definitions\/532.html."},{"volume-title":"Insufficient Logging","year":"2013","key":"e_1_3_2_1_5_1","unstructured":"CWE-778 : Insufficient Logging . 2013 . The MITRE Corporation , http:\/\/cwe.mitre.org\/data\/definitions\/778.html. CWE-778: Insufficient Logging. 2013. The MITRE Corporation, http:\/\/cwe.mitre.org\/data\/definitions\/778.html."},{"volume-title":"Logging of Excessive Data","year":"2013","key":"e_1_3_2_1_6_1","unstructured":"CWE-779 : Logging of Excessive Data . 2013 . The MITRE Corporation , http:\/\/cwe.mitre.org\/data\/definitions\/779.html. CWE-779: Logging of Excessive Data. 2013. The MITRE Corporation, http:\/\/cwe.mitre.org\/data\/definitions\/779.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Trusted Computer System Evaluation Criteria","author":"Department of Defense Standard","year":"1985","unstructured":"Department of Defense Standard : Trusted Computer System Evaluation Criteria . 1985 . United States Department of Defense , http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf. Department of Defense Standard: Trusted Computer System Evaluation Criteria. 1985. United States Department of Defense, http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"E2147-01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems. 2013. American Society for Testing and Materials http:\/\/www.astm.org\/Standards\/E2147.htm. E2147-01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems . 2013. American Society for Testing and Materials http:\/\/www.astm.org\/Standards\/E2147.htm."},{"key":"e_1_3_2_1_9_1","unstructured":"Electronic Health Records and Meaningful Use. 2011. The Office of the National Coordinator for Health Information Technology http:\/\/healthit.hhs.gov\/portal\/server.pt\/community\/healthit_hhs_gov__meaningful_use_announcement\/2996. Electronic Health Records and Meaningful Use . 2011. The Office of the National Coordinator for Health Information Technology http:\/\/healthit.hhs.gov\/portal\/server.pt\/community\/healthit_hhs_gov__meaningful_use_announcement\/2996."},{"key":"e_1_3_2_1_10_1","volume-title":"July 11, 2013. The Office of the National Coordinator for Health Information Technology, http:\/\/www.healthit.gov\/sites\/default\/files\/170","author":"Test Procedure 0.","year":"2014","unstructured":"Test Procedure for 17 0. 314(d)(2) Auditable events and tamper-resistance . July 11, 2013. The Office of the National Coordinator for Health Information Technology, http:\/\/www.healthit.gov\/sites\/default\/files\/170 .314d2auditableevents_ 2014 _tp_approvedv1.2.pdf. Test Procedure for 170.314(d)(2) Auditable events and tamper-resistance. July 11, 2013. The Office of the National Coordinator for Health Information Technology, http:\/\/www.healthit.gov\/sites\/default\/files\/170.314d2auditableevents_2014_tp_approvedv1.2.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"Hernan S. Lambert S. Ostwald T. and Shostack A. 2006. Uncover Security Design Flaws Using the STRIDE Approach Microsoft. Available: http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx. Hernan S. Lambert S. Ostwald T. and Shostack A. 2006. Uncover Security Design Flaws Using the STRIDE Approach Microsoft. Available: http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx."},{"key":"e_1_3_2_1_12_1","unstructured":"Kent K. and Souppaya M. 2006. Guide to Computer Security Log Management. National Institute of Standards and Technology Gaithersburg Maryland USA. Available: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-92\/SP800-92.pdf. Kent K. and Souppaya M. 2006. Guide to Computer Security Log Management . National Institute of Standards and Technology Gaithersburg Maryland USA. Available: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-92\/SP800-92.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110399"},{"key":"e_1_3_2_1_14_1","unstructured":"King J. and Williams L. 2013. Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems. Presented as part of the 2013 USENIX Workshop on Health Information Technologies (Washington DC USA). King J. and Williams L. 2013. Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems. Presented as part of the 2013 USENIX Workshop on Health Information Technologies (Washington DC USA)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.41"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"volume-title":"#2011-5. Systematizing Security Test Planning Using Functional Requirements Phrases","author":"Smith B.","key":"e_1_3_2_1_18_1","unstructured":"Smith , B. and Williams , L . #2011-5. Systematizing Security Test Planning Using Functional Requirements Phrases . North Carolina State University . Smith, B. and Williams, L. #2011-5. Systematizing Security Test Planning Using Functional Requirements Phrases. North Carolina State University."}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T18:32:04Z","timestamp":1673548324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600183"}},"subtitle":["design principles for software logging mechanisms"],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":18,"alternative-id":["10.1145\/2600176.2600183","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600183","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}