The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Audit with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1977 (18) 1980-1984 (21) 1985-1988 (17) 1989-1990 (15) 1991-1992 (15) 1993-1995 (17) 1996-1997 (26) 1998 (15) 1999 (28) 2000 (35) 2001 (33) 2002 (35) 2003 (47) 2004 (65) 2005 (76) 2006 (87) 2007 (98) 2008 (113) 2009 (72) 2010 (55) 2011 (60) 2012 (49) 2013 (38) 2014 (55) 2015 (65) 2016 (54) 2017 (60) 2018 (65) 2019 (80) 2020 (87) 2021 (133) 2022 (161) 2023 (127) 2024 (33)
Publication types (Num. hits)
article(763) book(2) data(1) incollection(11) inproceedings(1159) phdthesis(18) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 809 occurrences of 533 keywords

Results
Found 1957 publication records. Showing 1955 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
35Bruce A. Philp, Brian J. Garner Knowledge Mediation in Software Quality Engineering. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Knowledge mediated concurrent audit, XP, software development process, software risk
35Christoph C. Michael, Anup K. Ghosh Two State-based Approaches to Program-based Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance
32Junliang Zhang, Dingyi Fang, Li Liu Intelligent Content Filtering Model for Network Security Audit System. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Túlio Cicero Salvaro de Souza, Jean Everson Martina, Ricardo Felipe Custódio Audit and backup procedures for hardware security modules. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PKI ceremony, embedded cryptographic hardware, hardware security module, key life-cycle, key management, public key infrastructure
32Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu A Portable Interceptor Mechanism on SOAP for Continuous Audit. Search on Bibsonomy APSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Fei Yu 0001, Yue Shen, Huang Huang, Cheng Xu 0001, Xia-peng Dai An Information Audit System Based on Bayes Algorithm. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Fei Yu 0001, Huang Huang, Cheng Xu 0001, Xiao-peng Dai, Miaoliang Zhu Badness Information Audit Based on Image Character Filtering. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos Towards a Privacy Audit Programmes Comparison Framework. Search on Bibsonomy EGOV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Data visualization, Multivariate data analysis
32Gerald Quirchmayr, Beate List, A Min Tjoa Analyzing Workflow Audit Trails in Web-Based Environments with Fuzzy Logic. Search on Bibsonomy EC-Web The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Joachim Biskup, Ulrich Flegel On Pseudonymization of Audit Data for Intrusion Detection. Search on Bibsonomy Workshop on Design Issues in Anonymity and Unobservability The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Rajendra P. Srivastava, Hai Lu Structural Analysis of Audit Evidence using Belief Functions. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Cu D. Nguyen, Alessandro Marchetto 0001, Paolo Tonella Test Case Prioritization for Audit Testing of Evolving Web Services Using Information Retrieval Techniques. Search on Bibsonomy ICWS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Webservice composition, audit testing, test case prioritization
29David Huemer, A Min Tjoa A Stepwise Approach Towards an Interoperable and Flexible Logging Principle for Audit Trails. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF XML, grid computing, cloud computing, logging, audit trail
29Haiming Zheng, Tieqiao Guo Relative Accuracy Test Audit Evaluation for Flue Gas Continuous Emission Monitoring Systems in Power Plant. Search on Bibsonomy PACIIA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Continuous Emissions Monitoring Systems (CEMS), Relative Accuracy Test Audit (RATA)
29Limin Jia 0001, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, Steve Zdancewic AURA: a programming language for authorization and audit. Search on Bibsonomy ICFP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, type systems, audit, authorization logic
29Bruce Schneier, John Kelsey Secure Audit Logs to Support Computer Forensics. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF authenthication, intrusion detection, auditing, computer forensics, hash chains, audit logs
29Paul Helman, Gunar E. Liepins Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF audit trail analysis, computer misuse, computer transactions, stationary stochastic processes, misuse detectors, detection accuracy, transaction attributes, statistical foundations, modeling, transaction processing, NP-hard, security of data, stochastic processes, auditing, density estimation, system security, computer crime, heuristic approach
28Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs Proofs of Retrievability via Hardness Amplification. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev An access control reference architecture. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF architecture centric evolution, security, access control, reference architecture
28Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos Super-Efficient Verification of Dynamic Outsourced Databases. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram Privacy and Utility in Business Processes. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Di Ma Secure Feedback Service in Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feedback Service, ACK aggregation, ACK implosion, Sensor network, Authentication, MAC, Bloom Filter
28Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Michael Bauland, Philippe Chapdelaine, Nadia Creignou, Miki Hermann, Heribert Vollmer An Algebraic Approach to the Complexity of Generalized Conjunctive Queries. Search on Bibsonomy SAT (Selected Papers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Gaurav Tandon, Debasis Mitra 0003, Philip K. Chan Motif-Oriented Representation of Sequences for a Host-Based Intrusion Detection System. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF user education, access control, social engineering, physical security
28Yogesh Deshpande, Anupama Chandrarathna, Athula Ginige Web site auditing: first step towards re-engineering. Search on Bibsonomy SEKE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF web site auditing, web site evaluation, web site reengineering, web site, web development
28William Shapiro, Radek Vingralek How to Manage Persistent State in DRM Systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Wenke Lee, Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, feature construction
28Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson Dynamic Multi-threshold Metering Schemes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Metering Schemes, Security, Cryptography, Entropy
27He Li, Zhengjie Sun, Feiqi Huang The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's Audit Fees and Cybersecurity Risks. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
27William Finch, William K. Gray, Louisa Hermans, Andrew Boasman, Tim W. R. Briggs, Andrew Dickinson Comparing reported management of ureteric stones between clinical audit and administrative datasets: An opportunity to streamline clinical audit. Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Anisa Putri Pertiwi, Fransisca Hanita Rusgowanto The Effects of Company Size, Solvency, Public Accounting Firm Size, and Debt Default on Going Concern Audit Opinions with Financial Conditions Serving as a Moderator Variable: The Effects of Company Size, Solvency, Public Accounting Firm Size, and Debt Default on Going Concern Audit Opinions with Financial Conditions Serving as a Moderator Variable. Search on Bibsonomy ICEME The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Nobushige Doi, Yusuke Nobuta, Takeshi Mizuno Topic Classification of Key Audit Matters in Japanese Audit Reports by Zero-shot Text Classification. Search on Bibsonomy IIAI-AAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Benjamin Awuah, Joseph Mensah Onumah, King Carl Tornam Duho Determinants of adoption of computer-assisted audit tools and techniques among internal audit units in Ghana. Search on Bibsonomy Electron. J. Inf. Syst. Dev. Ctries. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Ibrahim Emair Albawwat Tacit knowledge sharing in small audit firms and audit quality inputs: the antecedent effect of auditors' social capital. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Annie L. Witte, Christine E. Earley, Jay C. Thibodeau Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based Audit Tools to Influence the Audit in Non-Global Network Firms. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Gisela Gilberta, Rindang Widuri, Faris Kasenda Factors Affecting the Implementation of Remote Audit in the Audit Process in the COVID-19 Pandemic. Search on Bibsonomy ICEEG The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Meiryani Meiryani, Nadia Aliffia, Andreas, Rindang Widuri, Dianka Wahyuningtias, Silvia Dewiyanti Analysis of The Influence of Audit Opinions, Change of Management, Public Accounting Firm Size, Size of Client Companies and Audit Fees on Auditor Switching. Search on Bibsonomy MSIE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Bambang Leo Handoko, Firda Arfianti, Sherly Marlinda The Utilization of Blockchain Technology on Remote Audit to Ensure Audit Data Integrity in Detecting Potential Fraudulent Financial Reporting. Search on Bibsonomy ICSEB The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Chengai Li, Lin Pan, Meilan Chen The Overseas Experience of Audit Committee and Audit Fees: Empirical Evidence from China. Search on Bibsonomy Complex. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Bong Gu Huh, Sunhwa Lee, Wonsin Kim The impact of the input level of information system audit on the audit quality: Korean evidence. Search on Bibsonomy Int. J. Account. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Meiryani Meiryani, Klara Karlita Rianty, Zaidi Mat Daud, Tommy Andrian, Ilham Condro Prabowo The Effect of Audit Service Market Concentration and Power Market of Public Accountant Office on Audit Fee. Search on Bibsonomy ICEBT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Eu-Gene Siew, Khairina Rosli, Paul H. P. Yeow Organizational and environmental influences in the adoption of computer-assisted audit tools and techniques (CAATTs) by audit firms in Malaysia. Search on Bibsonomy Int. J. Account. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Santy Setiawan, Barnabas Tridig S, Yuliana Gunawan, Deta Sekar Sari The Effect of Information Technology Audit on the Audit Quality in Detecting Fraud Using the Competence of the Auditor as a Moderation Variable. Search on Bibsonomy ICIBE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Saeed Askary, Jean-Paul M. Arnaout, Naser Abughazaleh Audit evidences and modelling audit risk using goal programming. Search on Bibsonomy Int. J. Appl. Decis. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Md. Shariful Islam, Jaeung Lee 0003 Internal Audit Function (IAF)'s Competencies and Cybersecurity Audit. Search on Bibsonomy AMCIS The full citation details ... 2018 DBLP  BibTeX  RDF
27Johannes Langhein, Oliver Thomas Audit Cloud Adoption by German Audit Firms. Search on Bibsonomy ICIS The full citation details ... 2018 DBLP  BibTeX  RDF
27Dyah Paramita Budi Dharma, Puspa Indahati Sandhyaduhita, Ave Adriana Pinem, Achmad Nizar Hidayanto Antecedents of intention-to-use of e-audit system: a case of the Audit Board of the Republic of Indonesia. Search on Bibsonomy Int. J. Bus. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Anna M. Rose, Jacob M. Rose, Kerri-Ann Sanderson, Jay C. Thibodeau When Should Audit Firms Introduce Analyses of Big Data Into the Audit Process? Search on Bibsonomy J. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Sojung Lucia Kim, Thompson S. H. Teo, Anol Bhattacherjee, Kichan Nam IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Tung-Hsien Wu, Shi-Ming Huang, Shaio Yan Huang, David C. Yen The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Li-Jen He Successor Audit Partner Choice for Mandatory Audit Partner Rotation Companies. Search on Bibsonomy IMIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Irina Malaescu, Steve G. Sutton The Reliance of External Auditors on Internal Audit's Use of Continuous Audit. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Numanul Subhani, Robert D. Kent Continuous process auditing (CPA): An audit rule ontology based approach to audit-as-a-service. Search on Bibsonomy SysCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Dichapong Pongpattrachai, Paul B. Cragg, Richard Fisher IT infusion within the audit process: Spreadsheet use in small audit firms. Search on Bibsonomy Int. J. Account. Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27He-Ming Ruan, Chin-Laung Lei Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Jordan Brouns Développement d'outils numériques pour l'audit énergétique des bâtiments. (Development of numerical tools for building energy audit). Search on Bibsonomy 2014   RDF
27William R. Titera Updating Audit Standard - Enabling Audit Data Analysis. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Bruce I. Davidson, Naman K. Desai, Gregory J. Gerard The Effect of Continuous Auditing on the Relationship between Internal Audit Sourcing and the External Auditor's Reliance on the Internal Audit Function. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Khairina Rosli, Paul H. P. Yeow, Eu-Gene Siew Adoption of Audit Technology in Audit Firms. Search on Bibsonomy ACIS The full citation details ... 2013 DBLP  BibTeX  RDF
27Elizabeth Carson, Carlin Dowling The Competitive Advantage of Audit Support Systems: The Relationship between Extent of Structure and Audit Pricing. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27M. Dale Stoel, Douglas Havelka, Jeffrey W. Merhout An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners. Search on Bibsonomy Int. J. Account. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Jason Tyler King, Ben H. Smith, Laurie A. Williams Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms. Search on Bibsonomy IHI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27She-I Chang, Chih-Fong Tsai, Dong-Her Shih, Chia-Ling Hwang The development of audit detection risk assessment system: Using the fuzzy theory and audit risk model. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27David Chadwick, Rodney E. Sue Teaching spreadsheet development using peer audit and self-audit methods for reducing error Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
27Grenville J. Croll A Typical Model Audit Approach: Spreadsheet Audit Methodologies in the City of London Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
27She-I Chang, Chih-Fong Tsai, Chia-Ling Hwang The Development of Audit Detection Risk Assessment System: Using the Fuzzy Theory and Audit Risk Model. Search on Bibsonomy PACIS The full citation details ... 2007 DBLP  BibTeX  RDF
27Peter J. Best, George M. Mohay, Alison Anderson Machine-independent audit trail analysis - a tool for continuous audit assurance. Search on Bibsonomy Intell. Syst. Account. Finance Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Ulrich Flegel Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2003 DBLP  BibTeX  RDF
27Vincenzo Cutello, Emilio Mastriani, Francesco Pappalardo 0001 Piranha Audit: Kernel Enhancements And Utilities To Improve Audit/Logging. Search on Bibsonomy Annual Linux Showcase & Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27A. D. Chambers Audit Test Packs and Computer Audit Programs. Search on Bibsonomy Comput. J. The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
25Xiaofan Jiang 0001, Minh Van Ly, Jay Taneja, Prabal Dutta, David E. Culler Experiences with a high-fidelity wireless building energy auditing network. Search on Bibsonomy SenSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor networks, wireless, power, energy, audit, building
25Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF audit automation, real time action, insider threat, active directory, user identification
25Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data integrity, digital signatures, data privacy, pseudonyms, audit logs, redaction
25Nouha Oualha, Yves Roudier Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. Search on Bibsonomy IWSOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF P2P storage, cooperation, audit, evolutionary game, trust establishment
25Wing Bun Lee, Vivien Shek, Benny C. F. Cheung Auditing and Mapping the Knowledge Assets of Business Processes - An Empirical Study. Search on Bibsonomy KSEM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Knowledge audit, Knowledge assets, Knowledge mapping, Intellectual capital
25Joyce E. Hicks Looking for the magic formula: evaluating our it communication mix. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF communication audit, newsletter, techqual+ study, documentation, engagement, new media
25Susan J. Lincke Network security auditing as a community-based learning project. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, audit, service learning
25Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu On identity assurance in the presence of federated identity management systems. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF models, control, risk, identity, audit, assurance
25Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption
25Vaclav Petricek, Tobias Escher, Ingemar J. Cox, Helen Z. Margetts The web structure of e-government - developing a methodology for quantitative evaluation. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF national audit offices, webmetric, network, e-government, ranking
25William R. Claycomb, Dongwan Shin Mobile-driven architecture for managing enterprise security policies. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF enterprise security management, mobile solution, authentication, access control, security policy, audit
25David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
25Jong Youl Choi, Markus Jakobsson, Susanne Wetzel Balancing auditability and privacy in vehicular networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF light-weight, privacy, incentive, audit, symmetric
25Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multi-hop cellular networks, routing, collaboration, detection, Audit, rational, micro-payment
25Mihir Bellare, Bennet S. Yee Forward-Security in Private-Key Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security
25Dieter Gantenbein, Luca Deri Categorizing Computing Assets According to Communication Patterns. Search on Bibsonomy NETWORKING Tutorials The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Network and System Management, Inventory and Asset Management, Due Diligence, Data Mining and OLAP, IT Audit
25Roman M. Wong, Siddhartha Bhattacharyya Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF knowledge intensive processes, task structure, audit risk assessment, software engineering, knowledge-based systems, knowledge acquisition, software reuse, Knowledge modeling
25John R. Wilson, L. Cordiner, Sarah Nichols 0001, L. Norton, N. Bristol, Theresa Clarke, S. Roberts On the Right Track: Systematic Implementation of Ergonomics in Railway Network Control. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Ergonomics audit, Railway ergonomics, Field study, Situation awareness, Mental workload, Control rooms, Cognitive ergonomics
25Barbara Masucci, Douglas R. Stinson Metering Schemes for General Access Structures. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Distributed Audit, Security, Cryptography, Entropy, Metering
25Alberto Avritzer, Elaine J. Weyuker Investigating Metrics for Architectural Assessment. Search on Bibsonomy IEEE METRICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF architecture discovery, architecture audit, architecture review
25Calvin Ko, Manfred Ruschitzka, Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework
25Kymie M. C. Tan, Blair R. Collie Detection and Classification of TCP/IP Network Services. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement
25Chris Hall, Bruce Schneier Remote Electronic Gambling. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF remote electronic gambling, casino games, random bit generation, random permutation generation, player/player collusions, player/dealer collusions, secure audit trail, debt payment, security, Internet, Internet, fairness, public key cryptography
25Christoph L. Schuba, Eugene H. Spafford A Reference Model for Firewall Technology. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security
25Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran On the Identification of Covert Storage Channels in Secure Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF covert storage channels, Secure Xenix kernel, visible/alterable kernel variables, language code, sharing relationships, nondiscretionary access rules, false flow violations, kernel locations, audit code, time-delay variables, covert-channel handling, software engineering, identification, security of data, source code, operating systems (computers), secure systems, information-flow analysis, implementation languages
23 Audit Trail. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Gabriel Murray, Thomas Kleinbauer, Peter Poller, Tilman Becker, Steve Renals, Jonathan Kilgour Extrinsic summarization evaluation: A decision audit task. Search on Bibsonomy ACM Trans. Speech Lang. Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF evaluation, interfaces, abstraction, browsing, Summarization, extraction
Displaying result #101 - #200 of 1955 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license