نتایج جستجو برای: auditing
تعداد نتایج: 4816 فیلتر نتایج به سال:
Abusive tax shelters implemented through partnerships and S corporations have become increasingly popular amongst tax planners, helping high-income taxpayers to underreport an estimated $91 billion of income annually in the US alone. The most challenging problems for tax collection agencies in this respect are a) the recent upswing in large, tiered partnership structures and b) the evolving nat...
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preser...
This paper examines the economic consequences of tightening auditing standards. We recognize that both auditors’ incentives and expertise are relevant for audit effectiveness. On one hand, tighter auditing standards counter the misbehavior of rogue auditors. On the other hand, tighter standards restrict auditors’exercise of professional judgement, leads to auditors’compliance mentality, and red...
Two high-level abstraction networks for the knowledge content of a terminology, known respectively as the "area taxonomy" and "p-area taxonomy," have previously been defined. Both are derived automatically from partitions of the terminology's concepts. An important application of these networks is in auditing, where a number of systematic regimens have been formulated utilizing them. In particu...
Cloud storage introduces many challenges due to the security and integrity threats toward user’s outsourced data. Many auditing protocols have been proposed, but the majority of them could only serve in single cloud environment. This paper proposes an efficient auditing protocol, which supports batch auditing for multiple data files in multi-cloud environment. By utilizing the bilinear map, the...
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and “redundancy”. Our co...
Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید