Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
Banks currently have a great interest in internal audits to reduce risks, to prevent themselves from insolvency, and to take quick action for financial incidents. This study prese...