نتایج جستجو برای: auditing
تعداد نتایج: 4816 فیلتر نتایج به سال:
In this paper, we tend to propose a completely unique privacy-preserving mechanism that supports public auditing on shared information hold on within the cloud. Particularly, we tend to exploit ring signatures to cipher verification data required to audit the correctness of shared information. With our mechanism, the identity of the signer on every block in shared information is unbroken person...
Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data...
Many Peer-to-Peer Distributed Virtual Environments (P2P DVE’s) have been proposed, but none are widely deployed. One significant barrier to deployment is lack of security. This paper presents Carbon, a trusted auditing system for P2P DVE’s which provides reasonable security with low per-client overhead. DVE’s using Carbon perform offline auditing to evaluate DVE client correctness. Carbon audit...
Auditing by downstream firms has limited effects on Chinese firms’ adherence to labor standards and other measures of blue collar workers well-being. Auditing does not affect the suppliers’ blue-collar employees’ wages, probability of belonging to a union, or likelihood of working overtime. However, audited firms are more likely to provide rural migrant workers pensions, business medical insura...
This article makes a bridge between the theory of optimal auditing and the scoring methodology in an asymmetric information setting. Our application is meant for asurance claims fraud, but it can be applied to many other activities that use the scoring approach. We show that the optimal auditing strategy takes the form of a "Red Flags Strategy" which consists in referring claims to a Special In...
This paper presents a strategy for applying sampling techniques to relational databases, in the context of data quality auditing or decision support processes. Fuzzy cluster sampling is used to survey sets of records for correctness of business rules. Relational algebra estimators are presented as a data quality-auditing tool.
introduction: the review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. method: the current study aimed to present a model for au...
Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called BCIC, for policies that combine proofs and trusted assertions about code. In this paper, using BCIC, we suggest an approach to code auditing that bases auditing decisions on logical policies and tools.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید