Sciweavers

425 search results - page 27 / 85
» Audit
Sort
View
FEGC
2009
94views Biometrics» more  FEGC 2009»
13 years 5 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...
ICWS
2009
IEEE
13 years 5 months ago
DIALOG: Distributed Auditing Logs
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Christoph Ringelstein, Steffen Staab
TOPNOC
2010
13 years 2 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
EDBT
2006
ACM
118views Database» more  EDBT 2006»
14 years 7 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
EDBT
2010
ACM
127views Database» more  EDBT 2010»
14 years 2 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett