Academic literature on the topic 'Auditabilité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Auditabilité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Auditabilité"
Johari, Razana Juhaida, and Sayed Alwee Hussnie Sayed Hussin. "Enhancing management integrity through auditability concept: a literature review." Humanomics 32, no. 4 (November 14, 2016): 516–24. http://dx.doi.org/10.1108/h-09-2016-0069.
Full textResearch Committee. "Systems auditability and control." Computer Audit Update 1992, no. 1 (January 1992): 18–20. http://dx.doi.org/10.1016/0960-2593(92)90028-l.
Full textHinde, Stephen. "Management's responsibility for auditability." Computer Audit Update 1996, no. 7 (July 1996): 2–4. http://dx.doi.org/10.1016/0960-2593(96)88545-4.
Full textJerard, V. Joseph Michael, and P. Manimegalai. "Content arrangement characteristic based encryption in cloud using public auditing for data management." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 30. http://dx.doi.org/10.14419/ijet.v7i1.1.8918.
Full textJones, James H. "2.4.3 Verification “Auditability” can be “Free”." INCOSE International Symposium 12, no. 1 (August 2002): 710–18. http://dx.doi.org/10.1002/j.2334-5837.2002.tb02530.x.
Full textBhaskar, Krish. "Security: User requirements, workstations, and auditability." Computer Fraud & Security Bulletin 9, no. 7 (May 1987): 3–9. http://dx.doi.org/10.1016/0142-0496(87)90038-5.
Full textVijaya Swetha, K., P. Sai Kiran, and K. V. V. Satyanarayana. "Privacy and Auditability in Cloud Assisted Health Data." Asian Journal of Information Technology 18, no. 4 (December 20, 2019): 133–38. http://dx.doi.org/10.36478/ajit.2019.133.138.
Full textSlesinger, Gay. "Electronic commerce: How to ensure control and auditability." Journal of Corporate Accounting & Finance 4, no. 3 (1993): 319–27. http://dx.doi.org/10.1002/jcaf.3970040307.
Full textKumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 11 (2016): 588. http://dx.doi.org/10.5958/2249-7315.2016.01215.6.
Full textKumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 12 (2016): 154. http://dx.doi.org/10.5958/2249-7315.2016.01284.3.
Full textDissertations / Theses on the topic "Auditabilité"
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Full textSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
De, Lagarde Olivier. "L'invention du contrôle des risques dans les organismes d'assurance." Phd thesis, Université Paris Dauphine - Paris IX, 2010. http://tel.archives-ouvertes.fr/tel-00497720.
Full textShelley, Rian. "A Novel Technique of Network Auditability with Managers In The Loop." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/115.
Full textSharma, Munish. "SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105147.
Full textMontelius, Gustaf, and Andreas Sandberg. "En studie av den rådande New Public Management-diskursen kring svensk sjukvård : En kritisk diskursanalys." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-30342.
Full textBackground: Since the 1980s, a collection of organizational ideas and theories borrowed from the private sector and under the name of New Public Management have entered the public sector and healthcare. As the public awareness of these ideas and theories has increased, a vivid debate about New Public Management within the healthcare has gained momentum. Politically, a wish for a development of new models of management beyond New Public Management in the public sector have been introduced. Thus, it is of interest to study the discourse of New Public Management surrounding Swedish healthcare. Objective: This thesis aims to study the current discourse of New Public Management surrounding Swedish healthcare. By using a critical analytical perspective the objective of the thesis is also to study how this discourse can be linked to the structural relations that manifest themselves through language. Method: Critical discourse analysis Theories: New Public Management, Auditability, Concept of quality, Discourse analysis, Critical discourse analysis Empiric: Secondary data consisting of debate articles about Swedish healthcare Conclusion: This thesis have identified a structural relation of power in the discoursive dimension which manifest itself through language.
"Generating Trusted Coordination of Collaborative Software Development Using Blockchain." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.62732.
Full textDissertation/Thesis
Masters Thesis Software Engineering 2020
Cogo, Vinicius. "Efficient, Dependable Storage of Human Genome Sequencing Data." Doctoral thesis, 2020. http://hdl.handle.net/10451/49766.
Full textThe understanding of human genome impacts several areas of human life. Data from human genomes is massive because there are millions of samples to be sequenced, and each sequenced human genome may size hundreds of gigabytes. Human genomes are critical because they are extremely valuable to research and may provide hints on individuals’ health status, identify their donors, or reveal information about donors’ relatives. Their size and criticality, plus the amount of data being produced by medical and life-sciences institutions, require systems to scale while being secure, dependable, auditable, and affordable. Current storage infrastructures are too expensive to ignore cost efficiency in storing human genomes, and they lack the proper knowledge and mechanisms to protect the privacy of sample donors. This thesis proposes an efficient storage system for human genomes that medical and lifesciences institutions may trust and afford. It enhances traditional storage ecosystems with privacy-aware, data-reduction, and auditability techniques to enable the efficient, dependable use of multi-tenant infrastructures to store human genomes. Contributions from this thesis include (1) a study on the privacy-sensitivity of human genomes; (2) to detect genomes’ privacy-sensitive portions systematically; (3) specialised data reduction algorithms for sequencing data; (4) an independent auditability scheme for secure dispersed storage; and (5) a complete storage pipeline that obtains reasonable privacy protection, security, and dependability guarantees at modest costs (e.g., less than $1/Genome/Year) by integrating the proposed mechanisms with appropriate storage configurations.
Books on the topic "Auditabilité"
Kelman, Alistair. Computer fraud in small businesses: Security and auditability of business micro computers. London: EconomistIntelligence Unit, 1985.
Find full textVirginia. Auditor of Public Accounts. A study of electronic commerce: Auditability and obstacles : report of the Auditor of Public Accounts to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 2001.
Find full textUnited States. Congress. House. Committee on Armed Services. Oversight and Investigations Subcommittee. Department of Defense auditability challenges: Hearing before the Subcommittee on Oversight and Investigations of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held September 14, 2012. Washington: U.S. G.P.O., 2013.
Find full textIndustry perspectives on achieving audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held November 17, 2011. Washington: U.S. G.P.O., 2012.
Find full textDepartment of Defense component audit efforts: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 8, 2011. Washington: U.S. G.P.O., 2011.
Find full textDOD's efforts to improve payment and funds control: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 22, 2011. Washington: U.S. G.P.O., 2011.
Find full textDOD's enterprise resource planning (ERP) system implementation efforts: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held October 27, 2011. Washington: U.S. G.P.O., 2012.
Find full textOrganizational challenges in achieving sound financial management and audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 15, 2011. Washington: U.S. G.P.O., 2011.
Find full textDOD's plans for financial management improvement and achieving audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held July 28, 2011. Washington: U.S. G.P.O., 2011.
Find full textIs the financial management workforce positioned to achieve DOD's financial improvement goals?: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held October 6, 2011. Washington: U.S. G.P.O., 2012.
Find full textBook chapters on the topic "Auditabilité"
Guts, Nataliya, Cédric Fournet, and Francesco Zappa Nardelli. "Reliable Evidence: Auditability by Typing." In Computer Security – ESORICS 2009, 168–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04444-1_11.
Full textRivest, Ronald L., Philip B. Stark, and Zara Perumal. "BatchVote: Voting Rules Designed for Auditability." In Financial Cryptography and Data Security, 317–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_20.
Full textTyagi, Rahul, and Venkatesh Thuppil. "Conceptual Framework of Research Data Auditability." In Quality Assurance Implementation in Research Labs, 15–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3074-3_2.
Full textChen, Yu, Xuecheng Ma, Cong Tang, and Man Ho Au. "PGC: Decentralized Confidential Payment System with Auditability." In Computer Security – ESORICS 2020, 591–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58951-6_29.
Full textPinheiro, Alexandre, Claudia Cappelli, and Cristiano Maciel. "Increasing Information Auditability for Social Network Users." In Lecture Notes in Computer Science, 536–47. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07731-4_53.
Full textRushinek, Avi, and Sara Rushinek. "EDP system development methodology: Auditability and control." In Formal Methods and Software Development, 423–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-15199-0_28.
Full textSaltman, Roy G., and M. S. M.P.A. "Public Confidence and Auditability in Voting Systems." In Advances in Information Security, 125–37. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_8.
Full textChatzigiannis, Panagiotis, Foteini Baldimtsi, and Konstantinos Chalkias. "SoK: Auditability and Accountability in Distributed Payment Systems." In Applied Cryptography and Network Security, 311–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78375-4_13.
Full textKo, Ryan K. L., Bu Sung Lee, and Siani Pearson. "Towards Achieving Accountability, Auditability and Trust in Cloud Computing." In Advances in Computing and Communications, 432–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22726-4_45.
Full textMeskanen, Tommi, Masoud Naderpour, and Valtteri Niemi. "Mind Your Right to Know: On De-anonymization Auditability in V2X Communications." In Network and System Security, 604–10. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_47.
Full textConference papers on the topic "Auditabilité"
Weigand, Hans, and Philip Elsas. "Auditability as a Design Problem." In 2019 IEEE 21st Conference on Business Informatics (CBI). IEEE, 2019. http://dx.doi.org/10.1109/cbi.2019.00038.
Full text"PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001392001690174.
Full textChoi, Jong Youl, Markus Jakobsson, and Susanne Wetzel. "Balancing auditability and privacy in vehicular networks." In the 1st ACM international workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1089761.1089775.
Full textMiguel, Beatriz San, Aisha Naseer, and Hiroya Inakoshi. "Putting Accountability of AI Systems into Practice." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/768.
Full textLadouceur, Daniel, Bimmy Pujari, Edward Gleeck, and Joel Coffman. "Techniques for Mutual Auditability in a Cloud Environment." In the 12th IEEE/ACM International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3368235.3368875.
Full textJiang, Hong-Chun, Chao-Sheng Feng, and Ding Yuan. "Enabling public and privacy-preserving auditability for cloud storage." In 2016 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2016. http://dx.doi.org/10.1109/icmlc.2016.7860872.
Full textChakraborty, T. K., A. Dhami, P. Bansal, and T. Singh. "Enhanced public auditability & secure data storage in cloud computing." In 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514202.
Full textChen, Long, and Hongbo Chen. "Ensuring Dynamic Data Integrity with Public Auditability for Cloud Storage." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.183.
Full textKim, Yeojin, Donghyun Kim, Junggab Son, Wei Wang, and YoungTae Noh. "A New Fog-Cloud Storage Framework with Transparency and Auditability." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422479.
Full textAlhajaili, Sara, and Arshad Jhumka. "Auditability: An Approach to Ease Debugging of Reliable Distributed Systems." In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2019. http://dx.doi.org/10.1109/prdc47002.2019.00053.
Full text