Sciweavers

425 search results - page 10 / 85
» Audit
Sort
View
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
14 years 8 months ago
Auditing SQL Queries
We study the problem of auditing a batch of SQL queries: Given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this ...
Rajeev Motwani, Shubha U. Nabar, Dilys Thomas
CCS
2007
ACM
14 years 1 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
USS
2010
13 years 5 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...
WWW
2010
ACM
14 years 2 months ago
Analyzing content-level properties of the web adversphere
Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In thi...
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic,...
ISCIS
2003
Springer
14 years 20 days ago
Design of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...
Attila Özgit, Burak Dayioglu, Erhan Anuk, Ina...