نتایج جستجو برای: auditing

تعداد نتایج: 4816  

2008
Chengliang Zhang Martin Hirzel

Good data layouts improve cache and TLB performance of object-oriented software, but unfortunately, selecting an optimal data layout a priori is NP-hard. This paper introduces layout auditing, a technique that selects the best among a set of layouts online (while the program is running). Layout auditing randomly applies different layouts over time and observes their performance. As it becomes c...

2007
RUEY-SHUN CHEN

Relying on XML and Web Service technologies under Service-Oriented Architecture (SOA) environments, this paper presents a model for continuous auditing on internal control, referred to as Collaborative Continuous Auditing Model (CCAM). By the wrapping of data transformation components with Enterprise Resource Planning databases, software venders can provide schema-matching services for the clie...

2008
Rohana Ngah Abdul Razak Ibrahim

Delivering professional service to its clients, knowledge is auditing firm’s core capital. In conducting its practices and businesses, auditing firms not only capture knowledge within its organization, among its own people but also capturing and protecting the information of their clients. The nature of auditing firms somehow rather controls the flow of knowledge in the firms. Knowledge managem...

2015
Naelah Abdulrahman Alkhojandi Ali Miri

Storage represents one of the most commonly used cloud services. Data integrity and storage efficiency are two key requirements when storing users’ data. Public auditability, where users can employ a Third Part Auditor (TPA) to ensure data integrity, and efficient data deduplication which can be used to eliminate duplicate data and their corresponding authentication tags before sending the data...

2001
Sharon Tennyson

Research on insurer management of opportunism in claiming has developed in two parallel literatures. One is a theoretical literature on insurance contracting that yields predictions about the nature of optimal auditing strategies for the deterrence of fraud. The other is a literature based upon statistical analysis of claims that yields empirical strategies for the detection of fraudulent claim...

2014
Viet Pham Carlos Cid

While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., " lazy-but-honest " contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and " redundancy ". Ou...

Journal: :I. J. Network Security 2015
Yang Ming Yumin Wang

Cloud computing provides a scalability environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. It is necessary for cloud service provider to offer an efficient audit service to check the integrity and availability of the stored data in cloud. In this paper, we study three auditing schemes for stored data including...

2016
Swapnali S. More Sangita Chaudhari Cong Wang Sherman SM Chow Qian Wang Kui Ren Wenjing Lou

Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data stored in the cloud as the user's data can be attacked or modified by outside attacker. Therefore, a new concept called data auditing is introduced whic...

2011
Yurdaer N. Doganata Francisco Curbera

The risk exposure of an organization is the cost of being noncompliant for all process instances that are subject to auditing and it can be reduced by auditing internal controls for every process instance, detecting and eliminating the cause of non-compliance. This paper discusses the design consideration for an automated auditing tool to achieve the desired level of risk exposure reduction. A ...

Journal: :IJGC 2014
Clément Mouchet Neil Urquhart Rob Kemmer

This article has presents an extensive survey of the state of the art in Green IT/S. The findings of the survey suggest that there is scope for a reliable carbon footprint auditing tool for organisational ICT usage. A prototype auditing tool is developed and a trial audit carried out and evaluated. Conclusions include the need for automation of the audit, the need for consistent management of h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید