نتایج جستجو برای: auditing

تعداد نتایج: 4816  

2015
PAGUTURU RAVI KISHORE K JAYA KUMARI

In this paper, we tend to propose a completely unique privacy-preserving mechanism that supports public auditing on shared information hold on within the cloud. Particularly, we tend to exploit ring signatures to cipher verification data required to audit the correctness of shared information. With our mechanism, the identity of the signer on every block in shared information is unbroken person...

2016
Yong Yu Yannan Li Man Ho Au Willy Susilo Kim-Kwang Raymond Choo Xinpeng Zhang

Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data...

2009
John L. Miller Jon Crowcroft

Many Peer-to-Peer Distributed Virtual Environments (P2P DVE’s) have been proposed, but none are widely deployed. One significant barrier to deployment is lack of security. This paper presents Carbon, a trusted auditing system for P2P DVE’s which provides reasonable security with low per-client overhead. DVE’s using Carbon perform offline auditing to evaluate DVE client correctness. Carbon audit...

2009
Jeffrey Perloff Guojun He Jeffrey M. Perloff

Auditing by downstream firms has limited effects on Chinese firms’ adherence to labor standards and other measures of blue collar workers well-being. Auditing does not affect the suppliers’ blue-collar employees’ wages, probability of belonging to a union, or likelihood of working overtime. However, audited firms are more likely to provide rural migrant workers pensions, business medical insura...

Journal: :International Journal of Advanced Computer Science and Applications 2018

Journal: :Management Science 2009
Georges Dionne Florence Giuliano Pierre Picard

This article makes a bridge between the theory of optimal auditing and the scoring methodology in an asymmetric information setting. Our application is meant for asurance claims fraud, but it can be applied to many other activities that use the scoring approach. We show that the optimal auditing strategy takes the form of a "Red Flags Strategy" which consists in referring claims to a Special In...

2004
Bruno Cortes José Nuno Oliveira

This paper presents a strategy for applying sampling techniques to relational databases, in the context of data quality auditing or decision support processes. Fuzzy cluster sampling is used to survey sets of records for correctness of business rules. Relational algebra estimators are presented as a data quality-auditing tool.

Journal: :journal of health management and informatics 0
hamid moghaddasi reza rabiei nasrin sadeghi

introduction: the review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. method: the current study aimed to present a model for au...

2007
Nathan Whitehead Jordan Johnson Martín Abadi

Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called BCIC, for policies that combine proofs and trusted assertions about code. In this paper, using BCIC, we suggest an approach to code auditing that bases auditing decisions on logical policies and tools.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید