Academic literature on the topic 'Auditabilité'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Auditabilité.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Auditabilité"

1

Johari, Razana Juhaida, and Sayed Alwee Hussnie Sayed Hussin. "Enhancing management integrity through auditability concept: a literature review." Humanomics 32, no. 4 (November 14, 2016): 516–24. http://dx.doi.org/10.1108/h-09-2016-0069.

Full text
Abstract:
Purpose The purpose of this paper is to highlight the importance of auditability concept as one of the corporate governance indicators that could increase the management integrity practices and public confidence toward the organizations. Nowadays, most business organizations having issues related to the complexity of the transactions, which make it difficult to collect audit evidence and eventually may affect the company’s good governance. This paper highlights the importance of management integrity practices through auditability concept that needs to be emphasized in today’s business environment. Auditability is the ability of the organizations to provide accurate adequate records to be audited by auditors. Design/methodology/approach A number of databases in fields such as social sciences and economics were used to acquire literature on the topic. Findings A discussion on the auditability concept through auditability triangle and auditability model and how management could strengthen the governance practices. Originality/value This paper provides new inputs to related parties in preparing more comprehensive guidelines on the implementation of auditability practice among the management as to increase the public confidence on the reported financial statements.
APA, Harvard, Vancouver, ISO, and other styles
2

Research Committee. "Systems auditability and control." Computer Audit Update 1992, no. 1 (January 1992): 18–20. http://dx.doi.org/10.1016/0960-2593(92)90028-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hinde, Stephen. "Management's responsibility for auditability." Computer Audit Update 1996, no. 7 (July 1996): 2–4. http://dx.doi.org/10.1016/0960-2593(96)88545-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jerard, V. Joseph Michael, and P. Manimegalai. "Content arrangement characteristic based encryption in cloud using public auditing for data management." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 30. http://dx.doi.org/10.14419/ijet.v7i1.1.8918.

Full text
Abstract:
The encryption standard related to cryptography provide the possible keys with logical standard for sharing and distributing sensitive information sharing worldview in conveyed frameworks. A Content Arrangement Characteristic Based Encryption (CA-CBE) is turning into a promising cryptographic solution for this issue. The cloud needs to provide the view on open auditability. Many methodologies have been discussed on dynamic information administration and on general auditability, however those methodologies suffer from the issue of check overhead and time multifaceted nature. Therefore, it is important to propose a Content Arrangement Characteristic Based Encryption (CA-CBE) scheme for supporting data dynamics over the data operation, like block alteration, block inset, and deletion. Some existing data integrity based research always lacks in dynamic operations and public auditability. By considering this as a motivation, this research is initiated.
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, James H. "2.4.3 Verification “Auditability” can be “Free”." INCOSE International Symposium 12, no. 1 (August 2002): 710–18. http://dx.doi.org/10.1002/j.2334-5837.2002.tb02530.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhaskar, Krish. "Security: User requirements, workstations, and auditability." Computer Fraud & Security Bulletin 9, no. 7 (May 1987): 3–9. http://dx.doi.org/10.1016/0142-0496(87)90038-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vijaya Swetha, K., P. Sai Kiran, and K. V. V. Satyanarayana. "Privacy and Auditability in Cloud Assisted Health Data." Asian Journal of Information Technology 18, no. 4 (December 20, 2019): 133–38. http://dx.doi.org/10.36478/ajit.2019.133.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Slesinger, Gay. "Electronic commerce: How to ensure control and auditability." Journal of Corporate Accounting & Finance 4, no. 3 (1993): 319–27. http://dx.doi.org/10.1002/jcaf.3970040307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 11 (2016): 588. http://dx.doi.org/10.5958/2249-7315.2016.01215.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 12 (2016): 154. http://dx.doi.org/10.5958/2249-7315.2016.01284.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Auditabilité"

1

Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.

Full text
Abstract:
Les protocoles de sécurité enregistrent souvent des données disponibles lors de leurs exécutions dans un journal pour une éventuelle analyse a posteriori, aussi appelée audit. En pratique, les procédures d'audit restent souvent informelles, et le choix du contenu des journaux est laissé au bon sens du programmeur. Cette thèse a pour but la formalisation et la vérification des propriétés attendues des journaux d'audit. D'abord, nous nous intéressons à l'utilisation des journaux par les protocoles de sécurité dits optimistes qui, contrairement aux protocoles classiques, reposent sur le contenu des journaux pour remettre certaines vérifications de sécurité à la fin de leur exécution. Nous faisons une étude formelle de deux schémas optimistes : la mise en gage de valeur et le porte-monnaie électronique. En appliquant les techniques issues des langages de processus, nous montrons que les informations enregistrées par leurs implémentations suffisent pour détecter toute tentative de tricherie de participants. Ensuite nous définissons l'auditabilité comme la capacité d'un protocole de collecter assez de preuves pour convaincre une procédure d'audit préétablie (juge). Nous proposons une méthode basée sur les types avec des raffinements logiques, pour vérifier l'auditabilité, et nous l'implémentons dans une extension d'un typeur existant. Nous montrons que la vérification de l'auditabilité se réduit à une vérification par le typage. Nous implémentons également un support logique des pré- et post-conditions génériques pour améliorer le typage modulaire des fonctions d'ordre supérieur
Security protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
APA, Harvard, Vancouver, ISO, and other styles
2

De, Lagarde Olivier. "L'invention du contrôle des risques dans les organismes d'assurance." Phd thesis, Université Paris Dauphine - Paris IX, 2010. http://tel.archives-ouvertes.fr/tel-00497720.

Full text
Abstract:
L'Union européenne refonde entièrement le dispositif de contrôle prudentiel des organismes d'assurance dans le cadre de la Directive Solvabilité II. En cours de mise en place, la Directive, qui peut être comparée à la norme prudentielle bancaire Bâle II, a surtout été analysée sous l'angle des techniques actuarielles. Mais la réforme soulève aussi des enjeux sociopolitiques importants. En instituant un nouveau contrôle sectoriel des risques, les assureurs – véritables inventeurs du dispositif – démontrent la portée politique de la théorie de l'auditabilité formulée par Power. En effet, les institutions d'assurance qui ont codéfini les normes de sécurité auxquelles elles vont être soumises, attachent davantage d'importance à la promotion de leur conformité aux nouvelles règles prudentielles qu'à l'efficience du dispositif mis en œuvre. Les conséquences potentielles sur le secteur sont pourtant lourdes. L'assurance encourt en effet le risque d'une financiarisation complète, au détriment de sa mission spécifique de protection. Elle pourrait aussi saisir cette opportunité pour réinventer sa diversité. Le contexte de la crise économique, qui a conduit les gouvernants à s'intéresser aux dispositifs de régulation, souligne le paradoxe foucaldien de la surveillance prudentielle de l'assurance : il s'agit de sécuriser une technologie de sécurité. Dans le cadre de la postmodernité financière, le contrôle des risques se politise et vient jouer le rôle du restaurateur de confiance afin de sauver le modèle libéral de ses propres turpitudes.
APA, Harvard, Vancouver, ISO, and other styles
3

Shelley, Rian. "A Novel Technique of Network Auditability with Managers In The Loop." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/115.

Full text
Abstract:
Network management requires a large amount of knowledge about the network. In particular, knowledge about used network addresses, access time, and topology is useful. In a network composed of managed devices, much of the data necessary can come from simple network management protocol (SNMP) queries. Other data can come from other databases, or analysis of existing data. In particular, layer-two network topology can be determined by analyzing the mac address forwarding tables of layer-two devices. The layer-two topology can be merged with a layer-three topology to generate a complete topology of the network. This information is useless unless it is easily accessible to the network manager; therefore, a simple interface should be used to give access to all of this data.
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Munish. "SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105147.

Full text
Abstract:
Health Informatics has enlightened by the recent development in the internet of medical things 4.0. Healthcare services have seen greater acceptance of Information and Communications Technology (ICT) in recent years; in light of the increasing volume of patient data, the traditional way of storing data in physical files has eventually moved to a digital alternative such as Electronic Health Record (EHR). However, the conventional healthcare data systems are plagued with a single point of failure, security issues, mutable logging, and inefficient methods to retrieve healthcare records. Solid (Social Linked Data) has been developed as a decentralized technology to alter digital data sharing and ownership for its users radically. However, Solid alone cannot address all the security issues posed to data exchange and storage. This work combines two decentralized technologies, Solid ecosystem and Blockchain technology, to tackle potential security issues using Solidity-based Smart Contracts, thereby providing a secure patient centric design. This research evaluates a model solution for secure storage, emphasizing secure auditing of accessing the data stored. The architecture will also come with algorithms that will provide developers with logical instructions to implement the artefact.
APA, Harvard, Vancouver, ISO, and other styles
5

Montelius, Gustaf, and Andreas Sandberg. "En studie av den rådande New Public Management-diskursen kring svensk sjukvård : En kritisk diskursanalys." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-30342.

Full text
Abstract:
Bakgrund: Sedan 1980-talet har en uppsättning organisatoriska idéer och teorier lånade från näringslivet under namnet New Public Management tagit sig in i den offentliga sektorn och sjukvården. I takt med att medvetenheten om dessa idéer och teorier ökat hos allmänheten har en levande debatt om New Public Management inom sjukvården tagit fart. Från politiskt håll har nu en önskan om att utveckla nya styrmodeller för offentlig sektor bortom New Public Management lagts fram. Därför är det av intresse att studera New Public Management-diskursen kring svensk sjukvård. Syfte: Denna studie avser studera den rådande New Public Management-diskursen kring svensk sjukvård. Utifrån ett kritiskt analytiskt perspektiv är syftet med studien också att undersöka hur denna diskurs kan kopplas till de strukturella relationer som manifesteras av språket. Metod: Kritisk diskursanalys Teorier: New Public Management, Revisions- och mätbarhet, Kvalitetsbegreppet, Diskursanalys, Kritisk diskursanalys Empiri: Sekundärdata bestående av debattartiklar om svensk sjukvård. Slutsats: Denna studie har identifierat en strukturell maktrelation i den diskursiva praktiken som manifesteras i språket.
Background: Since the 1980s, a collection of organizational ideas and theories borrowed from the private sector and under the name of New Public Management have entered the public sector and healthcare. As the public awareness of these ideas and theories has increased, a vivid debate about New Public Management within the healthcare has gained momentum. Politically, a wish for a development of new models of management beyond New Public Management in the public sector have been introduced. Thus, it is of interest to study the discourse of New Public Management surrounding Swedish healthcare. Objective: This thesis aims to study the current discourse of New Public Management surrounding Swedish healthcare. By using a critical analytical perspective the objective of the thesis is also to study how this discourse can be linked to the structural relations that manifest themselves through language. Method: Critical discourse analysis Theories: New Public Management, Auditability, Concept of quality, Discourse analysis, Critical discourse analysis Empiric: Secondary data consisting of debate articles about Swedish healthcare Conclusion: This thesis have identified a structural relation of power in the discoursive dimension which manifest itself through language.
APA, Harvard, Vancouver, ISO, and other styles
6

"Generating Trusted Coordination of Collaborative Software Development Using Blockchain." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.62732.

Full text
Abstract:
abstract: The coordination of developing various complex and large-scale projects using computers has been well established and is the so-called computer-supported cooperative work (CSCW). Collaborative software development consists of a group of teams working together to achieve a common goal for developing a high-quality, complex, and large-scale software system efficiently, and it requires common processes and communication channels among these teams. The common processes for coordination among software development teams can be handled by similar principles in CSCW. The development of complex and large-scale software becomes complicated due to the involvement of many software development teams. The development of such a software system can be largely improved by effective collaboration among the participating software development teams at both software components and system levels. The efficiency of developing software components depends on trusted coordination among the participating teams for sharing, processing, and managing information on various participating teams, which are often operating in a distributed environment. Participating teams may belong to the same organization or different organizations. Existing approaches to coordination in collaborative software development are based on using a centralized repository to store, process, and retrieve information on participating software development teams during the development. These approaches use a centralized authority, have a single point of failure, and restricted rights to own data and software. In this thesis, the generation of trusted coordination in collaborative software development using blockchain is studied, and an approach to achieving trusted cooperation for collaborative software development using blockchain is presented. The smart contracts are created in the blockchain to encode software specifications and acceptance criteria for the software results generated by participating teams. The blockchain used in the approach is a private blockchain because a private blockchain has the characteristics of providing non-repudiation, privacy, and integrity, which are required in trusted coordination of collaborative software development. This approach is implemented using Hyperledger, an open-source private blockchain. An example to illustrate the approach is also given.
Dissertation/Thesis
Masters Thesis Software Engineering 2020
APA, Harvard, Vancouver, ISO, and other styles
7

Cogo, Vinicius. "Efficient, Dependable Storage of Human Genome Sequencing Data." Doctoral thesis, 2020. http://hdl.handle.net/10451/49766.

Full text
Abstract:
A compreensão do genoma humano impacta várias áreas da vida. Os dados oriundos do genoma humano são enormes pois existem milhões de amostras a espera de serem sequenciadas e cada genoma humano sequenciado pode ocupar centenas de gigabytes de espaço de armazenamento. Os genomas humanos são críticos porque são extremamente valiosos para a investigação e porque podem fornecer informações delicadas sobre o estado de saúde dos indivíduos, identificar os seus dadores ou até mesmo revelar informações sobre os parentes destes. O tamanho e a criticidade destes genomas, para além da quantidade de dados produzidos por instituições médicas e de ciências da vida, exigem que os sistemas informáticos sejam escaláveis, ao mesmo tempo que sejam seguros, confiáveis, auditáveis e com custos acessíveis. As infraestruturas de armazenamento existentes são tão caras que não nos permitem ignorar a eficiência de custos no armazenamento de genomas humanos, assim como em geral estas não possuem o conhecimento e os mecanismos adequados para proteger a privacidade dos dadores de amostras biológicas. Esta tese propõe um sistema de armazenamento de genomas humanos eficiente, seguro e auditável para instituições médicas e de ciências da vida. Ele aprimora os ecossistemas de armazenamento tradicionais com técnicas de privacidade, redução do tamanho dos dados e auditabilidade a fim de permitir o uso eficiente e confiável de infraestruturas públicas de computação em nuvem para armazenar genomas humanos. As contribuições desta tese incluem (1) um estudo sobre a sensibilidade à privacidade dos genomas humanos; (2) um método para detetar sistematicamente as porções dos genomas que são sensíveis à privacidade; (3) algoritmos de redução do tamanho de dados, especializados para dados de genomas sequenciados; (4) um esquema de auditoria independente para armazenamento disperso e seguro de dados; e (5) um fluxo de armazenamento completo que obtém garantias razoáveis de proteção, segurança e confiabilidade a custos modestos (por exemplo, menos de $1/Genoma/Ano), integrando os mecanismos propostos a configurações de armazenamento apropriadas
The understanding of human genome impacts several areas of human life. Data from human genomes is massive because there are millions of samples to be sequenced, and each sequenced human genome may size hundreds of gigabytes. Human genomes are critical because they are extremely valuable to research and may provide hints on individuals’ health status, identify their donors, or reveal information about donors’ relatives. Their size and criticality, plus the amount of data being produced by medical and life-sciences institutions, require systems to scale while being secure, dependable, auditable, and affordable. Current storage infrastructures are too expensive to ignore cost efficiency in storing human genomes, and they lack the proper knowledge and mechanisms to protect the privacy of sample donors. This thesis proposes an efficient storage system for human genomes that medical and lifesciences institutions may trust and afford. It enhances traditional storage ecosystems with privacy-aware, data-reduction, and auditability techniques to enable the efficient, dependable use of multi-tenant infrastructures to store human genomes. Contributions from this thesis include (1) a study on the privacy-sensitivity of human genomes; (2) to detect genomes’ privacy-sensitive portions systematically; (3) specialised data reduction algorithms for sequencing data; (4) an independent auditability scheme for secure dispersed storage; and (5) a complete storage pipeline that obtains reasonable privacy protection, security, and dependability guarantees at modest costs (e.g., less than $1/Genome/Year) by integrating the proposed mechanisms with appropriate storage configurations.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Auditabilité"

1

Kelman, Alistair. Computer fraud in small businesses: Security and auditability of business micro computers. London: EconomistIntelligence Unit, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Virginia. Auditor of Public Accounts. A study of electronic commerce: Auditability and obstacles : report of the Auditor of Public Accounts to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. House. Committee on Armed Services. Oversight and Investigations Subcommittee. Department of Defense auditability challenges: Hearing before the Subcommittee on Oversight and Investigations of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held September 14, 2012. Washington: U.S. G.P.O., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Industry perspectives on achieving audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held November 17, 2011. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Department of Defense component audit efforts: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 8, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

DOD's efforts to improve payment and funds control: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 22, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

DOD's enterprise resource planning (ERP) system implementation efforts: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held October 27, 2011. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Organizational challenges in achieving sound financial management and audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held September 15, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

DOD's plans for financial management improvement and achieving audit readiness: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held July 28, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Is the financial management workforce positioned to achieve DOD's financial improvement goals?: Hearing before the Panel on Defense Financial Management and Auditability Reform of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held October 6, 2011. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Auditabilité"

1

Guts, Nataliya, Cédric Fournet, and Francesco Zappa Nardelli. "Reliable Evidence: Auditability by Typing." In Computer Security – ESORICS 2009, 168–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04444-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rivest, Ronald L., Philip B. Stark, and Zara Perumal. "BatchVote: Voting Rules Designed for Auditability." In Financial Cryptography and Data Security, 317–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tyagi, Rahul, and Venkatesh Thuppil. "Conceptual Framework of Research Data Auditability." In Quality Assurance Implementation in Research Labs, 15–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3074-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yu, Xuecheng Ma, Cong Tang, and Man Ho Au. "PGC: Decentralized Confidential Payment System with Auditability." In Computer Security – ESORICS 2020, 591–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58951-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pinheiro, Alexandre, Claudia Cappelli, and Cristiano Maciel. "Increasing Information Auditability for Social Network Users." In Lecture Notes in Computer Science, 536–47. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07731-4_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rushinek, Avi, and Sara Rushinek. "EDP system development methodology: Auditability and control." In Formal Methods and Software Development, 423–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-15199-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saltman, Roy G., and M. S. M.P.A. "Public Confidence and Auditability in Voting Systems." In Advances in Information Security, 125–37. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chatzigiannis, Panagiotis, Foteini Baldimtsi, and Konstantinos Chalkias. "SoK: Auditability and Accountability in Distributed Payment Systems." In Applied Cryptography and Network Security, 311–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78375-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ko, Ryan K. L., Bu Sung Lee, and Siani Pearson. "Towards Achieving Accountability, Auditability and Trust in Cloud Computing." In Advances in Computing and Communications, 432–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22726-4_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meskanen, Tommi, Masoud Naderpour, and Valtteri Niemi. "Mind Your Right to Know: On De-anonymization Auditability in V2X Communications." In Network and System Security, 604–10. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Auditabilité"

1

Weigand, Hans, and Philip Elsas. "Auditability as a Design Problem." In 2019 IEEE 21st Conference on Business Informatics (CBI). IEEE, 2019. http://dx.doi.org/10.1109/cbi.2019.00038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001392001690174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choi, Jong Youl, Markus Jakobsson, and Susanne Wetzel. "Balancing auditability and privacy in vehicular networks." In the 1st ACM international workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1089761.1089775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miguel, Beatriz San, Aisha Naseer, and Hiroya Inakoshi. "Putting Accountability of AI Systems into Practice." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/768.

Full text
Abstract:
To improve and ensure trustworthiness and ethics on Artificial Intelligence (AI) systems, several initiatives around the globe are producing principles and recommendations, which are providing to be difficult to translate into technical solutions. A common trait among ethical AI requirements is accountability that aims at ensuring responsibility, auditability, and reduction of negative impact of AI systems. To put accountability into practice, this paper presents the Global-view Accountability Framework (GAF) that considers auditability and redress of conflicting information arising from a context with two or more AI systems which can produce a negative impact. A technical implementation of the framework for automotive and motor insurance is demonstrated, where the focus is on preventing and reporting harm rendered by autonomous vehicles.
APA, Harvard, Vancouver, ISO, and other styles
5

Ladouceur, Daniel, Bimmy Pujari, Edward Gleeck, and Joel Coffman. "Techniques for Mutual Auditability in a Cloud Environment." In the 12th IEEE/ACM International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3368235.3368875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Hong-Chun, Chao-Sheng Feng, and Ding Yuan. "Enabling public and privacy-preserving auditability for cloud storage." In 2016 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2016. http://dx.doi.org/10.1109/icmlc.2016.7860872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chakraborty, T. K., A. Dhami, P. Bansal, and T. Singh. "Enhanced public auditability & secure data storage in cloud computing." In 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Long, and Hongbo Chen. "Ensuring Dynamic Data Integrity with Public Auditability for Cloud Storage." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Yeojin, Donghyun Kim, Junggab Son, Wei Wang, and YoungTae Noh. "A New Fog-Cloud Storage Framework with Transparency and Auditability." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alhajaili, Sara, and Arshad Jhumka. "Auditability: An Approach to Ease Debugging of Reliable Distributed Systems." In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2019. http://dx.doi.org/10.1109/prdc47002.2019.00053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography