Sciweavers

425 search results - page 33 / 85
» Audit
Sort
View
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 7 months ago
Breaking Out of the Cell: On The Benefits of a New Spreadsheet User-Interaction Paradigm
Contemporary spreadsheets are plagued by a profusion of errors, auditing difficulties, lack of uniform development methodologies, and barriers to easy comprehension of the underly...
Ziv Hellman
CORR
2007
Springer
79views Education» more  CORR 2007»
13 years 7 months ago
Stop That Subversive Spreadsheet!
: This paper documents the formation of the European Spreadsheet Risks Interest Group (EuSpRIG www.eusprig.org) and outlines some of the research undertaken and reported upon by in...
David Chadwick
VOTEID
2007
Springer
14 years 1 months ago
Simulation-Based Analysis of E2E Voting Systems
Abstract. End-to-end auditable voting systems are expected to guarantee very interesting, and often sophisticated security properties, including correctness, privacy, fairness, rec...
Olivier de Marneffe, Olivier Pereira, Jean-Jacques...
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
BPM
2005
Springer
113views Business» more  BPM 2005»
14 years 1 months ago
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models
Most information systems log events (e.g., transaction logs, audit trails) to audit and monitor the processes they support. At the same time, many of these processes have been expl...
Anne Rozinat, Wil M. P. van der Aalst