نتایج جستجو برای: environmental auditing

تعداد نتایج: 375018  

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2008
Fleur Mougin Olivier Bodenreider

Auditing biomedical terminologies often results in the identification of inconsistencies and thus helps to improve their quality. In this paper, we present a method based on Semantic Web technologies for auditing biomedical terminologies and apply it to the NCI thesaurus. We stored the NCI thesaurus concepts and their properties in an RDF triple store. By querying this store, we assessed the co...

Journal: :Journal of Accounting and Management Information Systems 2019

Journal: :International Journal of Security and Its Applications 2015

2008
Wentian Lu Gerome Miklau

Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...

2017
E Lokesh Kumar Krishna Narayan P.Renuka Devi

As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data de-duplication in cloud while achieving integrity aud...

Journal: :Journal of Empirical Research in Accounting & Auditing An International Journal 2015

2015
PAGUTURU RAVI KISHORE K JAYA KUMARI

In this paper, we tend to propose a completely unique privacy-preserving mechanism that supports public auditing on shared information hold on within the cloud. Particularly, we tend to exploit ring signatures to cipher verification data required to audit the correctness of shared information. With our mechanism, the identity of the signer on every block in shared information is unbroken person...

2016
Yong Yu Yannan Li Man Ho Au Willy Susilo Kim-Kwang Raymond Choo Xinpeng Zhang

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید