Sciweavers

425 search results - page 19 / 85
» Audit
Sort
View
GI
2005
Springer
14 years 1 months ago
Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten
: Intrusion-Detection-Systeme (IDS) haben sich als wichtiges Instrument für den Schutz informationstechnischer Systeme erwiesen. Die meisten heute eingesetzten IDS realisieren ein...
Sebastian Schmerl
POLICY
2005
Springer
14 years 1 months ago
An Audit Logic for Accountability
We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architectu...
J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, ...
CSEE
2009
Springer
13 years 11 months ago
Using Quality Audits to Assess Software Course Projects
Assessing software engineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might requi...
Wilson Padua
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
DSS
2006
140views more  DSS 2006»
13 years 7 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...