Sciweavers

425 search results - page 45 / 85
» Audit
Sort
View
CSFW
1992
IEEE
13 years 11 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray
EVOW
2007
Springer
13 years 11 months ago
Evolutionary GUIs for Sound Synthesis
This paper describes an experiment carried out to determine which, among several possible evolutionary and non-evolutionary sound synthesizer graphical user interfaces, is the most...
James McDermott, Niall J. L. Griffith, Michael O'N...
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
EUROMICRO
2004
IEEE
13 years 11 months ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng
USS
2008
13 years 10 months ago
Administrative and Public Verifiability: Can We Have Both?
Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit tr...
Josh Benaloh