نتایج جستجو برای: energy auditing

تعداد نتایج: 670945  

Journal: :Progress in IS 2023

This open access book discusses the most modern approach to auditing complex digital systems and technologies.

Journal: :JCS 2014
D. Sumathi Ramachandra V. Pujeri

Cloud storage is considered to be the most critical factor in decision making for users as it largely scales down the infrastructure in terms of size, cost and design. Considering factors such as local storage cost, maintenance a single server model can support multiple users on a needed basis. This raises concerns for integrity verification i.e., assuring the correctness of the data stored ava...

Journal: :J. Comput. Syst. Sci. 2008
Peter Jonsson Andrei A. Krokhin

We study the computational complexity of auditing finite attributes in databases allowing statistical queries. Given a database that supports statistical queries, the auditing problem is to check whether an attribute can be completely determined or not from a given set of statistical information. Some restricted cases of this problem have been investigated earlier, e.g. the complexity of statis...

2005
MURRAY TUROFF MIKLOS VASARHELYI Murray Turoff Michael Chumer Roxanne Hiltz Robb Klashner Michael Alles Miklos Vasarhelyi

This paper examines the potential relationships of Continuous Auditing and Emergency Preparedness to the design, development, and implementation of Emergency Response Management Information Systems (ERMIS). It develops an argument for the integration of emergency response processes and continuous decision process auditing requirements into the system development life cycle of an organization wi...

2012
Jason Tyler King Laurie A. Williams

Introduction Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer...

1996
Bruce Schneier John Kelsey

Some digital signature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token’s ta...

2012
Shankaranarayanan Puzhavakath Narayanan Seungjoon Lee Subhabrata Sen

Configuration navigation and change-auditing is one of the most complex yet common tasks performed by network operators on a regular basis. Change-auditing router configuration files accurately is a challenging task due to presence of structure and hierarchy in the config content. Generic diff tools do not have the notion of context or syntactic structure while comparing files and produce diff ...

Journal: :The Annals of The Royal College of Surgeons of England 2008

Journal: :Maandblad Voor Accountancy en Bedrijfseconomie 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید