نتایج جستجو برای: auditing

تعداد نتایج: 4816  

1996
Bruce Schneier John Kelsey

Some digital signature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token’s ta...

2012
Shankaranarayanan Puzhavakath Narayanan Seungjoon Lee Subhabrata Sen

Configuration navigation and change-auditing is one of the most complex yet common tasks performed by network operators on a regular basis. Change-auditing router configuration files accurately is a challenging task due to presence of structure and hierarchy in the config content. Generic diff tools do not have the notion of context or syntactic structure while comparing files and produce diff ...

Journal: :The Annals of The Royal College of Surgeons of England 2008

Journal: :Maandblad Voor Accountancy en Bedrijfseconomie 2018

Journal: :Maandblad Voor Accountancy en Bedrijfseconomie 2004

Journal: : 2021

İşletmelerin küresel ekonomik rekabet ortamında faaliyetlerini gerçekleştirmesi, işletmelerin bilgi teknolojilerine dayalı mal ve hizmet üretim süreçleri oluşturmalarını zorunlu hale getirmektedir. Artan teknoloji kullanımı karşısında gerçekleştirilen faaliyetlere ait alt işlem süreçlerinin kontrol altına alınması yönetilmesi iç sistemlerine kritik bir rol yüklemektedir. Daha fazla sürecin veri...

Journal: :Lecture Notes in Computer Science 2021

Presidential primaries are a critical part of the United States electoral process, since they used to select candidates in election. While methods differ by state and party, many involve proportional delegate allocation using so-called Hamilton method. In this paper we show how conduct risk-limiting audits for elections variants method where viability is determined either plurality vote or inst...

2006

We consider a decentralized setting in which agents exchange data along with usage policies. Agents may violate the intended usage policies, although later on auditing authorities may verify the agents’ data accountability with respect to the intended policies. Using timestamping and signature schemes, we design and analyze an efficient cryptographic protocol generating communication evidences ...

2017
Mohaned Zkaria Salem Sahar F. Sabbeh Tarek EL-Shishtawy

one of the services provided by the cloud environment is cloud storage which allows users to store, remotely manage and access their data over the internet. However, the limited control granted to users over remote cloud nodes makes users worry about the integrity of their data as the user’ data can be accessed or modified by external attackers. Therefore, a new terminology called data auditing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید