Sciweavers

425 search results - page 4 / 85
» Audit
Sort
View
IJEH
2011
35views more  IJEH 2011»
12 years 11 months ago
Health plan auditing: 100-percent-of-claims vs. random-sample audits
George P. Sillup, Ronald K. Klimberg
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 11 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ECIS
2003
13 years 8 months ago
Real-time workflow audit data integration into data warehouse systems
Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems incl...
Josef Schiefer, Jun-Jang Jeng, Robert M. Bruckner
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
14 years 1 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...