Sciweavers

425 search results - page 16 / 85
» Audit
Sort
View
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 2 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
ICDAR
2009
IEEE
14 years 2 months ago
Document Analysis Support for the Manual Auditing of Elections
Recent developments have resulted in dramatic changes in the way elections are conducted, both in the United States and around the world. Well-publicized flaws in the security of...
Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang, Gan...
JIPS
2010
110views more  JIPS 2010»
13 years 2 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
SERVICES
2010
201views more  SERVICES 2010»
13 years 2 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
IROS
2006
IEEE
180views Robotics» more  IROS 2006»
14 years 1 months ago
Real-Time Robot Audition System That Recognizes Simultaneous Speech in The Real World
— This paper presents a robot audition system that recognizes simultaneous speech in the real world by using robotembedded microphones. We have previously reported Missing Featur...
Shun'ichi Yamamoto, Kazuhiro Nakadai, Mikio Nakano...