Semantic Audit Application
نویسندگان
چکیده
Abstract. Compliance checking of business processes executed by auditors requires to analyze documents e.g. log files, business process models depending on requirements derived from reference guidelines. This paper presents a forward compliance checking application for facilitating conformant behavior by detecting organizational operations and their deviations based on these documents in a semantic way. This application has been tested on the Internalization process in the respect of Erasmus mobility.
منابع مشابه
Auditing of Secure Multiparty Computations
Secure multiparty computations allow independent parties to collectively analyze data without compromising their input’s privacy. This data secrecy is guaranteed in some security model: in the passive model an adversary can only look at data visible to it, while in the active model adversaries can actively interfere in the computations. So from a security standpoint the active model is preferab...
متن کاملSelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting, e.g., Second Life and multi-player online games. Recent studies identify that malicious users may compromise the semantic integrity of NVE applications and violate the semantic rules o...
متن کاملCERIAS Tech Report 2000-28 BETTER LOGGING THROUGH FORMALITY APPLYING FORMAL SPECIFICATION TECHNIQUES TO IMPROVE AUDIT LOGS AND LOG CONSUMERS
We rely on programs that consume audit logs to do so successfully (a robustness issue) and form the correct interpretations of the input (a semantic issue). The vendor’s documentation of the log format is an important part of the specification for any log consumer. As a specification, it is subject to improvement using formal specification techniques. This work presents a methodology for formal...
متن کاملTowards the Development of a Cyber Analysis & Advisement Tool (CAAT) for Mitigating De-Anonymization Attacks
We are seeing a rise in the number of Anonymous Social Networks (ASN) that claim to provide a sense of user anonymity. However, what many users of ASNs do not know that a person can be identified by their writing style. In this paper, we provide an overview of a number of author concealment techniques, their impact on the semantic meaning of an author's original text, and introduce AuthorCAAT, ...
متن کاملInter-organizational Workflow for Intelligent Audit of Information Technologies in terms of Entreprise Business Processes
IT governance is critical to the success of Enterprise governance by providing effective, efficient and measurable improvements in business processes by ensuring that information technologies are in line with business objectives. Consequently, this paper provides an intelligent solution to audit Information System Business processes using the IT Governance Framework COBIT. The particularity of ...
متن کامل