Journal article Open Access

Securing Logs of Functional Testing Infrastructure by Masking Technique

Akshata Khasge; Nagaraja G S


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Data Masking, Data protection, Privacy, Security</subfield>
  </datafield>
  <controlfield tag="005">20220110134849.0</controlfield>
  <controlfield tag="001">5832368</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Student, Department of Computer Science and  Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru (Karnataka), India.</subfield>
    <subfield code="a">Nagaraja G S</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">240643</subfield>
    <subfield code="z">md5:902d661e98e331f58380e59d12b5d8d5</subfield>
    <subfield code="u">https://zenodo.org/record/5832368/files/A59100510121.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2021-05-30</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5832368</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">229-232</subfield>
    <subfield code="n">1</subfield>
    <subfield code="p">International Journal of Recent Technology and Engineering (IJRTE)</subfield>
    <subfield code="v">10</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Student, Department of Computer Science and  Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru (Karnataka), India.</subfield>
    <subfield code="a">Akshata Khasge</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Securing Logs of Functional Testing Infrastructure  by Masking Technique</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2277-3878</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)100.1/ijrte.A59100510121</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;As organizations become increasingly reliant on technology and data, data protection is now a mission critical priority. Ensuring that data is secure and uncorrupted is essential for avoiding downtime, ensuring productivity, and improving performance. Data protection is keeping the data i.e. confidential data secure from being corrupted or being compromised. Securing the data from logs also is essential when talking about data protection. The testing infrastructure which outputs logs may contain IP address as sensitive data, and this may be misused by other employs of the organization. So, by masking it or removing it from logs will make testing infrastructure more secure and testing can be done without interference of other.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2277-3878</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijrte.A5910.0510121</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
27
11
views
downloads
Views 27
Downloads 11
Data volume 2.6 MB
Unique views 24
Unique downloads 11

Share

Cite as