In prior work we described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the secu-rity and versioning features of database architecture together with those of image-supported electronic document information capture. We present herein the security and audit trail features of our construct. Unique usernames and passwords are used at the operating system level to en-force client validation and control access to the database system via an electronic signature using a Boolean logic algorithm. We used the database domain to capture original data and any changes to the data, developing an audit trail displaying identification information...
Although Novell Netware 286 provides excellent access control at both the server and the directory l...
Database auditing is a crucial part of database security and governance requirements. Database admin...
Maintaining an audit trail—the chronological record of activities that is sufficient to enable the r...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Many information systems have been around for several decades, and most of them have their underlyin...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
AbstractThis paper aims at identifying and presenting tools and techniques to help perform IT databa...
In todays society data breaches have become an all too common issue. Insecure databases allows intru...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
Includes bibliographical references (leaves 167-173)Accounting systems of large (Fortune 500) corpor...
Information systems in several application domains have to fulfil particularly stringent requirement...
This article outlines some of the basic principles involved in the design and administration of a se...
Audit logs are considered good practice for business systems, and are required by federal regulation...
Although Novell Netware 286 provides excellent access control at both the server and the directory l...
Database auditing is a crucial part of database security and governance requirements. Database admin...
Maintaining an audit trail—the chronological record of activities that is sufficient to enable the r...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Many information systems have been around for several decades, and most of them have their underlyin...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
AbstractThis paper aims at identifying and presenting tools and techniques to help perform IT databa...
In todays society data breaches have become an all too common issue. Insecure databases allows intru...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
Includes bibliographical references (leaves 167-173)Accounting systems of large (Fortune 500) corpor...
Information systems in several application domains have to fulfil particularly stringent requirement...
This article outlines some of the basic principles involved in the design and administration of a se...
Audit logs are considered good practice for business systems, and are required by federal regulation...
Although Novell Netware 286 provides excellent access control at both the server and the directory l...
Database auditing is a crucial part of database security and governance requirements. Database admin...
Maintaining an audit trail—the chronological record of activities that is sufficient to enable the r...