Sciweavers

57 search results - page 2 / 12
» Integrity Auditing of Outsourced Data
Sort
View
136
Voted
ECIS
2003
15 years 5 months ago
Real-time workflow audit data integration into data warehouse systems
Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems incl...
Josef Schiefer, Jun-Jang Jeng, Robert M. Bruckner
106
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 9 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
102
Voted
GRC
2008
IEEE
15 years 4 months ago
Security and Integrity in Outsourcing of Data Mining
David Wai-Lok Cheung
100
Voted
KBS
2008
83views more  KBS 2008»
15 years 3 months ago
Rule-based and case-based reasoning approach for internal audit of bank
Banks currently have a great interest in internal audits to reduce risks, to prevent themselves from insolvency, and to take quick action for financial incidents. This study prese...
Gun Ho Lee
127
Voted
CCS
2007
ACM
15 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...