نتایج جستجو برای: auditing

تعداد نتایج: 4816  

2015
Jacob B. Rosen Erik Hemberg Geoff Warner Sanith Wijesinghe Una-May O'Reilly

Abusive tax shelters implemented through partnerships and S corporations have become increasingly popular amongst tax planners, helping high-income taxpayers to underreport an estimated $91 billion of income annually in the US alone. The most challenging problems for tax collection agencies in this respect are a) the recent upswing in large, tiered partnership structures and b) the evolving nat...

Journal: :Future Generation Comp. Syst. 2014
Yong Yu Lei Niu Guomin Yang Yi Mu Willy Susilo

Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preser...

2017
Pingyang Gao Gaoqing Zhang Zhiguo He Volker Laux Pierre Liang Christian Leuz Haresh Sapra

This paper examines the economic consequences of tightening auditing standards. We recognize that both auditors’ incentives and expertise are relevant for audit effectiveness. On one hand, tighter auditing standards counter the misbehavior of rogue auditors. On the other hand, tighter standards restrict auditors’exercise of professional judgement, leads to auditors’compliance mentality, and red...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2007
Michael Halper Yue Wang Hua Min Yan Chen George Hripcsak Yehoshua Perl Kent A. Spackman

Two high-level abstraction networks for the knowledge content of a terminology, known respectively as the "area taxonomy" and "p-area taxonomy," have previously been defined. Both are derived automatically from partitions of the terminology's concepts. An important application of these networks is in auditing, where a number of systematic regimens have been formulated utilizing them. In particu...

2014
Xin Liu Yujia Jiang

Cloud storage introduces many challenges due to the security and integrity threats toward user’s outsourced data. Many auditing protocols have been proposed, but the majority of them could only serve in single cloud environment. This paper proposes an efficient auditing protocol, which supports batch auditing for multiple data files in multi-cloud environment. By utilizing the bilinear map, the...

2014
Viet Pham M. H. R. Khouzani Carlos Cid

While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and “redundancy”. Our co...

Journal: :International Journal of Quality & Reliability Management 2019

2007
Aditya K. Ghose George Koliadis

Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید