نتایج جستجو برای: auditing costs
تعداد نتایج: 181378 فیلتر نتایج به سال:
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the client’s secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become ...
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. In this paper, we will discuss three government regulations and how they have impacted information technology systems. We classify database auditing systems by considering features of the basic components of an auditing system as proposed by Bishop: the l...
Computer security auditing constitutes an important part of any organization’s security procedures. Because of the many inadequacies of currently used manual methods, thorough and timely auditing is often difficult to attain. Recent literature suggests that expert systems techniques can offer significant benefits when applied to security procedures such as risk analysis, security auditing and i...
We rely on economic theory to discuss how blockchain technology and cryptocurrencies will influence the rate and direction of innovation. We identify two key costs that are affected by distributed ledger technology: 1) the cost of verification; and 2) the cost of networking. Markets facilitate the voluntary exchange of goods and services between buyers and sellers. For an exchange to be execute...
OBJECTIVE The aim of this study was to evaluate the viability of energy audit as a management tool in primary care to improve the energy efficiency and environmental performance of a health center by reducing its operating costs. METHOD We conducted 55 energy audits in health centers from 2005-2010. The health centers were sized between 500 and 3,500 m(2), were located in health areas with 3,...
Retrospective security is an important element of layered security systems. Auditing is central to the theory and practice of retrospective security, however, in systems where auditing is used, programs are typically instrumented to generate audit logs using manual, adhoc strategies. This is a potential source of error even if log auditing techniques are formal, since the relation of the log it...
Auditing is an increasingly important operation for computer programming, for example in security (e.g. to enable history-based access control) and to enable reproducibility and accountability (e.g. provenance in scientific programming). Most proposed auditing techniques are ad hoc or treat auditing as a second-class, extralinguistic operation; logical or semantic foundations for auditing are n...
This paper studies the strategic effect of a difference in timing of verification in an agency model. A principal may choose between two equally efficient verification procedures: monitoring and auditing. Under auditing the principal receives additional information. Due to a double moral hazard problem, there exists a tension between incentives for effort and incentives for verification. Auditi...
HSE's publication 'Successful Health and Safety Management' (HSG65) describes key elements of successful health and safety management systems. A three level model is explained and one of the elements, auditing, is explored in detail by the regulator. The term auditing in the health and safety context is defined and the use of proprietary and in-house systems compared. The process of auditing is...
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thorough and timely auditing is often diicult to attain. Recent literature suggests that expert systems techniques can ooer signiicant beneets when applied to security procedures such as risk analysis , security auditing and intru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید