Sciweavers

57 search results - page 2 / 12
» Integrity Auditing of Outsourced Data
Sort
View
ECIS
2003
13 years 7 months ago
Real-time workflow audit data integration into data warehouse systems
Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems incl...
Josef Schiefer, Jun-Jang Jeng, Robert M. Bruckner
VLDB
2004
ACM
105views Database» more  VLDB 2004»
13 years 11 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
KBS
2008
83views more  KBS 2008»
13 years 5 months ago
Rule-based and case-based reasoning approach for internal audit of bank
Banks currently have a great interest in internal audits to reduce risks, to prevent themselves from insolvency, and to take quick action for financial incidents. This study prese...
Gun Ho Lee
CCS
2007
ACM
13 years 11 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...