|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 590 occurrences of 434 keywords
|
|
|
Results
Found 2122 publication records. Showing 2122 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Yingjiu Li, Lingyu Wang 0001, Xiaoyang Sean Wang, Sushil Jajodia |
Auditing Interval-Based Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings, pp. 553-567, 2002, Springer, 3-540-43738-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
132 | Hasan, Burkhard Stiller |
A Generic Model and Architecture for Automated Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Ambient Networks, 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005, Proceedings, pp. 121-132, 2005, Springer, 3-540-29388-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Lei Zhang 0004, Sushil Jajodia, Alexander Brodsky 0001 |
Simulatable Binding: Beyond Simulatable Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 16-31, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
101 | Wei Chen 0135, Jin-cheng Zhang, Yu-quan Jiang |
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 521-528, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
99 | Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya |
An efficient online auditing approach to limit private data disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 636-647, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
89 | Rajeev Motwani 0001, Shubha U. Nabar, Dilys Thomas |
Auditing a Batch of SQL Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 186-191, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 |
On the Confidential Auditing of Distributed Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 600-607, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing |
74 | Yogesh Deshpande, Anupama Chandrarathna, Athula Ginige |
Web site auditing: first step towards re-engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: Proceedings of the 14th international conference on Software engineering and knowledge engineering, SEKE 2002, Ischia, Italy, July 15-19, 2002, pp. 731-737, 2002, ACM, 1-58113-556-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web site auditing, web site evaluation, web site reengineering, web site, web development |
72 | Giovanni Vigna, Bryan Cassell, Dave Fayram |
An Intrusion Detection System for Aglets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents ![In: Mobile Agents, 6th International Conference, MA 2002, Barcelona, Spain, October 22-25, 2002, Proceedings, pp. 64-77, 2002, Springer, 3-540-00085-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, Mobile Agents, Intrusion Detection, Auditing |
67 | Wentian Lu, Gerome Miklau |
Auditing a Database under Retention Restrictions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 42-53, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Jeremy Lau, Matthew Arnold, Michael Hind, Brad Calder |
A Loop Correlation Technique to Improve Performance Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACT ![In: 16th International Conference on Parallel Architectures and Compilation Techniques (PACT 2007), Brasov, Romania, September 15-19, 2007, pp. 259-269, 2007, IEEE Computer Society, 0-7695-2944-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Hasan, Burkhard Stiller |
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 203-215, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim |
Simulatable auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 118-127, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Chun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen |
Developing the Continuous Assurance Embedded Continuous Audit Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1049-1054, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Rajeev Motwani 0001, Shubha U. Nabar, Dilys Thomas |
Auditing SQL Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 287-296, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Zhenghong Xiao, Changqin Huang, Fuyin Xu |
A Security Auditing Approach Based on Mobile Agent in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 243-250, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Chun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen |
Developing Continuous Audit and Integrating Information Technology in E-business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1013-1018, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Li Yang 0001 |
Teaching database security and auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 241-245, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
curriculum, auditing, database security |
52 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Precomputation of privacy policy parameters for auditing SQL queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008, pp. 87-93, 2008, ACM, 978-1-59593-993-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy violation detection, privacy, auditing, compliance, inference control, information disclosure |
52 | Gerardo Canfora, Bice Cavallo |
A Bayesian approach for on-line max and min auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 12-20, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Bayesian network, auditing, statistical database |
47 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
47 | Thomas Verghese, Ying Zhou |
Domain translation using relational structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 927-932, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
domain description, domain translation, multiple effect system task, knowledge-based translation, constrained descriptive language, common descriptive language, translation procedures, language syntax, mathematical notion, decision support systems, expert systems, expert systems, translation, auditing, auditing, business data processing, formal logic, first order predicate logic, relational structure, organizational decision support system |
45 | Vikram Goyal, Shyam K. Gupta 0001, Manish Singh, Anand Gupta |
Auditing Inference Based Disclosures in Dynamic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 67-81, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 33-47, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Igor Sfiligoi, Greg Quinn, Chris Green, Greg Thain |
Pilot job accounting and auditing in Open Science Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29 - October 1, 2008, pp. 112-117, 2008, IEEE Computer Society, 978-1-4244-2578-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Susan J. Lincke |
Network security auditing as a community-based learning project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 476-480, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, audit, service learning |
45 | Peirong Che, Zhaokun Bu, Rui Hou, Xinxing Shi |
Auditing Revenue Assurance Information Systems for Telecom Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (2) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 2, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 1597-1602, 2007, Springer, 978-0-387-76311-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Revenue assurance information system, Business process, Audit, Telecom operators |
45 | Yin Pan |
Security auditing course development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007, pp. 259-266, 2007, ACM, 978-1-59593-920-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, IT education, curriculum development, IT audit |
45 | Yongzheng Wu, Roland H. C. Yap |
A User-level Framework for Auditing and Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 95-105, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Jon Heffley, Pascal Meunier |
Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan |
Auditing Boolean Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, May 15-17, 2000, Dallas, Texas, USA, pp. 86-91, 2000, ACM, 1-58113-214-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Chengliang Zhang, Martin Hirzel |
Online Phase-Adaptive Data Layout Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2008 - Object-Oriented Programming, 22nd European Conference, Paphos, Cyprus, July 7-11, 2008, Proceedings, pp. 309-334, 2008, Springer, 978-3-540-70591-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | You Peng, Yanzhang Wang |
Research about Security Audit Platform in E-Government System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 235-239, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Leon Strous |
Audit of Information Systems: The Need for Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM ![In: SOFSEM '98: Theory and Practice of Informatics, 25th Conference on Current Trends in Theory and Practice of Informatics, Jasná, Slovakia, November 21-27, 1998, Proceedings, pp. 264-274, 1998, Springer, 3-540-65260-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Hakan Hacigümüs |
Middleware support for auditing service process flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MW4SOC ![In: Proceedings of the 1st Workshop on Middleware for Service Oriented Computing, MW4SOC 2006, Melbourne, Australia, November 27 - December 01, 2006, pp. 24-29, 2006, ACM, 1-59593-425-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, middleware, service oriented computing, auditing |
42 | George Din, Akihiro Hayakawa, Ina Schieferdecker, Peter H. Deussen |
An Auditing System for QoS-Enabled Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 159-, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TTCN3, QoS, Auditing, Online Testing, Policy-based Network Management |
40 | Chrysovalantis Gaganis, Fotios Pasiouras, Sailesh Tanna, Constantin Zopounidis |
Binary choice models for external auditors decisions in Asian banks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 8(2), pp. 123-139, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Classification, Auditing, Bank |
40 | Yanjiang Yang, Yingjiu Li, Robert H. Deng |
New Paradigm of Inference Control with Trusted Computing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 243-258, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security protocol, trusted computing, auditing, Inference control |
40 | Brent J. Liu, Zheng Zhou 0002, H. K. Huang |
A HIPAA-Compliant Architecture for Securing Clinical Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 19(2), pp. 172-180, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, monitoring, auditing, HIPAA |
40 | Jeff Smith |
LabDisplay: bringing computer lab management into the new millennium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 343-348, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ZENworks, iPrint, lab tools, labDisplay, student services, security, statistics, auditing, students, website, printing, software management, inventory, computer lab, labs, lab management, cost reduction, Novell |
34 | Yurdaer N. Doganata, Francisco Curbera |
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceedings, pp. 310-326, 2009, Springer, 978-3-642-03847-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios |
34 | Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang 0001, Gang Tan |
Document Analysis Support for the Manual Auditing of Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, 26-29 July 2009, pp. 733-737, 2009, IEEE Computer Society, 978-0-7695-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Bart Orriëns, Willem-Jan van den Heuvel, Mike P. Papazoglou |
On the Risk Management and Auditing of SOA Based Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008. Proceedings, pp. 124-138, 2008, Springer, 978-3-540-88478-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Gerardo Canfora, Bice Cavallo |
A Bayesian Approach for on-Line Max Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1020-1027, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Theodoros Levantakis, Remko Helms, Marco R. Spruit |
Developing a Reference Method for Knowledge Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKM ![In: Practical Aspects of Knowledge Management, 7th International Conference, PAKM 2008, Yokohama, Japan, November 22-23, 2008. Proceedings, pp. 147-159, 2008, Springer, 978-3-540-89446-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
knowledge audit, knowledge strategy process, Knowledge management, social network analysis, method engineering |
34 | Gerardo Canfora, Bice Cavallo |
Reasoning under Uncertainty in On-Line Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 257-269, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Nathan Whitehead, Jordan Johnson, Martín Abadi |
Policies and Proofs for Code Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 5th International Symposium, ATVA 2007, Tokyo, Japan, October 22-25, 2007, Proceedings, pp. 1-14, 2007, Springer, 978-3-540-75595-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Sergio Gutiérrez Santos, Grégory Valigiani, Yannick Jamont, Pierre Collet, Carlos Delgado Kloos |
A Swarm Approach for Automatic Auditing of Pedagogical Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, ICALT 2007, Niigata, Japan, July 18-20, 2007, pp. 136-138, 2007, IEEE Computer Society, 978-0-7695-2916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Reinhard Riedl, Manuel Juen |
IT Auditing in E-Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 341-352, 2006, Springer, 3-540-37686-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Muriel Roger, Jean Goubault-Larrecq |
Log Auditing through Model-Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 220-234, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Roger W. H. Bons, Frank Dignum, Ronald M. Lee, Yao-Hua Tan |
A Formal Specification of Automated Auditing of Trustworthy Trade Procedures for Open Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic, Gabriel Maciá-Fernández |
Analyzing content-level properties of the web adversphere. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 1201-1202, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
location-based advertising, web-based ad network, behavioral targeting |
33 | Pingping Zhang, Shiguang Ju, Weihe Chen |
A Location-Based Secure Spatial Audit Policy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 619-622, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Siman Wong |
An authentication protocol in Web-computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Rakesh Agrawal 0001, Evimaria Terzi |
On Honesty in Sovereign Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2006, 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006, Proceedings, pp. 240-256, 2006, Springer, 3-540-32960-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yao-Wen Huang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo |
Non-Detrimental Web Application Security Scanning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2-5 November 2004, Saint-Malo, Bretagne, France, pp. 219-230, 2004, IEEE Computer Society, 0-7695-2215-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Nikos Ntarmos, Peter Triantafillou |
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland, pp. 116-123, 2004, IEEE Computer Society, 0-7695-2156-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Zhixiong Chen, Jong P. Yoon, Christopher M. Frenz, Kenneth Compres |
IT Governance, Compliance and Auditing Curriculum-A Pedagogical Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 414-421, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Assessment, Curriculum, Compliance, Principles, Body of Knowledge, IT Auditing |
31 | Wil M. P. van der Aalst, Kees M. van Hee, Jan Martijn E. M. van der Werf, Marc Verdonk |
Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(3), pp. 90-93, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Auditing 2.0, Information technology, Process mining, IT systems |
31 | Zhixiong Chen, John Yoon |
IT Auditing to Assure a Secure Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: 6th World Congress on Services, SERVICES 2010, Miami, Florida, USA, July 5-10, 2010, pp. 253-259, 2010, IEEE Computer Society, 978-0-7695-4129-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Secure Cloud Computing, IT Compkiance, IT Auditing |
31 | Gerardo Canfora, Bice Cavallo |
A Probabilistic Approach for On-Line Sum-Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 303-308, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
sum-auditing, Privacy, Bayesian networks, Statistical databases |
31 | Chrysovalantis Gaganis, Constantin Zopounidis |
Multicriteria Decision Support Methodologies for Auditing Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Optimization ![In: Encyclopedia of Optimization, Second Edition, pp. 2362-2372, 2009, Springer, 978-0-387-74758-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Qualified audit reports, Classification, Auditing, Multicriteria decision aid |
31 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Online detection of malicious data access using DBMS auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1013-1020, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DBMS auditing, intrusion detection, SQL injection |
31 | Josh Goodman, Clark Verbrugge |
A peer auditing scheme for cheat elimination in MMOGs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NETGAMES 2008, Worcester, Massachusetts, USA, October 21-22, 2008, pp. 9-14, 2008, ACM, 978-1-60558-132-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
peer auditing, peer to peer, computer games, network model, trust model, cheating |
31 | Levent V. Orman |
Database auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the Eighteenth International Conference on Information Systems, Atlanta, Georgia, USA, December 15-17, 1997, pp. 297-314, 1997, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
audit performance, audit strategies, database auditing, optimum audit strategies, optimum timing of audits, database integrity |
29 | Yitao Duan |
Privacy without noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 1517-1520, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
simulatable query auditing, sum queries, differential privacy |
29 | Ali Razavi, Kostas Kontogiannis |
Pattern and Policy Driven Log Analysis for Software Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 108-111, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Software Auditing, Trace Analysis, Software Monitoring |
29 | Alexandre V. Evfimievski, Ronald Fagin, David P. Woodruff |
Epistemic privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Seventh ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2008, June 9-11, 2008, Vancouver, BC, Canada, pp. 171-180, 2008, ACM, 978-1-60558-108-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
positivstellensatz, privacy, auditing, query logs, disclosure, reasoning about knowledge, supermodularity |
29 | Florian Kerschbaum, Julien Vayssière |
Privacy-preserving data analytics as an outsourced service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 87-96, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data analytics, remote auditing, outsourcing, searchable encryption |
29 | Paul H. Dietz, Bret Harsham, Clifton Forlines, Darren Leigh, William S. Yerazunis, Sam Shipman, Bent Schmidt-Nielsen, Kathy Ryall |
DT controls: adding identity to physical interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIST ![In: Proceedings of the 18th Annual ACM Symposium on User Interface Software and Technology, Seattle, WA, USA, October 23-26, 2005, pp. 245-252, 2005, ACM, 1-59593-271-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
DiamondTouch, haptics, identity, auditing, multi-user, physical interfaces |
29 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 19(1), pp. 36-70, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
29 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 265-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
25 | Peng Jiang, Ruizhe Huang, Ding Li 0001, Yao Guo 0001, Xiangqun Chen, Jianhai Luan, Yuxin Ren 0001, Xinwei Hu |
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.15895, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Yinghui Huang, Wenting Shen, Jing Qin 0002, Huiying Hou |
Privacy-preserving certificateless public auditing supporting different auditing frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 128, pp. 103181, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Peng Jiang, Ruizhe Huang, Ding Li 0001, Yao Guo 0001, Xiangqun Chen, Jianhai Luan, Yuxin Ren 0001, Xinwei Hu |
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 355-372, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
25 | Tariqul Islam 0001, Kamrul Hasan, Saheb Singh, Joon S. Park |
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud/EdgeCom ![In: 9th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2022/8th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2022, Xi'an, China, June 25-27, 2022, pp. 74-79, 2022, IEEE, 978-1-6654-8066-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Lei Zeng, Yang Xiao 0001, Hui Chen 0001 |
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 3523-3534, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mary B. Curtis |
Discussion of 'The antecedents of the use of continuous auditing in the internal auditing context'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 13(3), pp. 263-266, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | George C. Gonzalez, Pratyush Nidhi Sharma, Dennis F. Galletta |
The antecedents of the use of continuous auditing in the internal auditing context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 13(3), pp. 248-262, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Jia Xu |
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 304, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
25 | C. Paul Morrey, James Geller, Michael Halper, Yehoshua Perl |
The Neighborhood Auditing Tool: A hybrid interface for auditing the UMLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Biomed. Informatics ![In: J. Biomed. Informatics 42(3), pp. 468-489, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Chih Yu, Hung-Chao Yu, Chi-Chun Chou |
The impacts of electronic commerce on auditing practices: an auditing process model for evidence collection and validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Syst. Account. Finance Manag. ![In: Intell. Syst. Account. Finance Manag. 9(3), pp. 195-216, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Daisuke Takahashi, Yang Xiao 0001 |
Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1474-1478, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | João Paulo S. Medeiros, Selan R. dos Santos |
RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers, pp. 168-179, 2008, Springer, 978-3-642-03551-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Francesco M. Malvestuto |
Auditing Categorical SUM, MAX and MIN Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 247-256, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sum-query, max-query, min-query, null values, Aggregate function |
23 | Rakesh Agrawal 0001, Alexandre V. Evfimievski, Jerry Kiernan, Raja Velu |
Auditing disclosure by relevance ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 79-90, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
derivation probability, hippocratic database, information retrieval, privacy, record linkage |
23 | Michael Elliott, Ray Dawson, Janet Edwards |
Towards real process improvement from internal auditing - A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 14(1), pp. 53-64, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ho Lee, Jung Hwan Song |
Designing Security Auditing Protocol with Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 364-376, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Pier Luigi Emiliani, Laura Burzagli |
W3C-WAI Content Accessibility Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Universal Access in Health Telematics ![In: Universal Access in Health Telematics, A Design Code of Practice, pp. 175-196, 2005, Springer, 3-540-26167-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jingyu Zhou, Giovanni Vigna |
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 168-178, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Rebecca Mercuri |
On auditing trails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(1), pp. 17-20, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Francesco M. Malvestuto, Mauro Mezzini |
Auditing Sum Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2003, 9th International Conference, Siena, Italy, January 8-10, 2003, Proceedings, pp. 126-142, 2003, Springer, 3-540-00323-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Robert Chalice, Olga M. Haring, Ronald R. Hochsprung |
Automated patient record summaries for health care auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1974 National Computer Conference, 6-10 May 1974, Chicago, Illinois, USA, pp. 81-84, 1974, AFIPS Press, 978-1-4503-7920-5. The full citation details ...](Pics/full.jpeg) |
1974 |
DBLP DOI BibTeX RDF |
|
22 | Ragib Hasan, Marianne Winslett |
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 621-632, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(3), pp. 185-197, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
22 | Alec Yasinsac, Matt Bishop |
The Dynamics of Counting and Recounting Votes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(3), pp. 22-29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jeffrey A. Vaughan, Limin Jia 0001, Karl Mazurak, Steve Zdancewic |
Evidence-Based Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 177-191, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access control, Logic, Audit, Computer Languages |
22 | Hakan Hacigümüs |
Efficient Dynamic Policy Monitoring in Service Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 494-499, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(10), pp. 1929-1941, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Juan José Salazar González |
Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 105(2-3), pp. 583-603, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Controlled rounding, Integer linear Programming, Statistical disclosure Control |
Displaying result #1 - #100 of 2122 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|