Evolutionary Game Analysis on Auditing Collusion under Dual Auditing System
نویسندگان
چکیده
منابع مشابه
AuditGuard: a system for database auditing under retention restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. In many domains, retention policies govern how long data can be preserved by an institution. Regulations like FERPA and HIPAA (in the U.S.) or th...
متن کاملAuditing Cryptography: Assessing System Security
Steve Stanek 78.1 Assessing Risk ..................................................................... 1023 78.2 Encryption’s Number-One Problem: Keeping Keys Secret........................................................................... 1024 78.3 Encryption’s Number-One Rule........................................ 1024 78.4 Remember to Encrypt E-Mail ...........................................
متن کاملOn Auditing Audit Trails
T he current auditing crisis of big business can provide useful lessons and suggestions for improving similar practices within the computer industry. Audit trails, whether computerbased or manually produced, typically form a significant part of the front-line defense for fraud detection and prevention within systems. Many of our security practices revolve around the generation and preservation ...
متن کاملInvesting in a Surgical Outcomes Auditing System
Background. Humanitarian surgical organizations consider both quantity of patients receiving care and quality of the care provided as a measure of success. However, organizational efficacy is often judged by the percent of resources spent towards direct intervention/surgery, which may discourage investment in an outcomes monitoring system. Operation Smile's established Global Standards of Care ...
متن کاملAn Auditing System for QoS-Enabled Networks
The ongoing challenge of supporting high performance communications, real-time critical and secure applications leads to a shift from traditional IP networks towards a more intelligent, end-to-end, service-aware network paradigm. Future networks have to i) be more content or application-aware; ii) provide dynamic features for service creation; iii) observe and enforce network-wide policies; and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2013
ISSN: 1812-5638
DOI: 10.3923/itj.2013.7661.7664