Sciweavers

171 search results - page 8 / 35
» Securing Provenance-Based Audits
Sort
View
PODS
2000
ACM
112views Database» more  PODS 2000»
13 years 12 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
IEEEARES
2008
IEEE
14 years 2 months ago
A Bayesian Approach for on-Line Max Auditing
In this paper we propose a method for on-line max auditing of dynamic statistical databases. The method extends the Bayesian approach presented in [2], [3] and [4] for static data...
Gerardo Canfora, Bice Cavallo
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 16 days ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
14 years 1 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack
SAFECOMP
2001
Springer
14 years 1 days ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...