Audit logs are a critical component in today’s enterprise business systems as they provide several benefits such as records transparency and integrity and security of sensitive information by creating a layer of evidential support. However, current implementations are vulnerable to attacks on data integrity or availability. This paper presents a Blockchain-based audit trail mechanism that leverages the security features of Blockchain to enable secure and reliable audit trails and to address the aforementioned vulnerabilities. The architecture design and specific implementation are described in detail, resulting in a real prototype of a reliable, secure, and user-friendly audit trail mechanism.This research was funded by the European Commiss...
Blockchain is a relatively new technology that has shown a lot of possibilities. It emerged in 2009 ...
As data is having an increasingly relevant role in di erent business fields, ensuring integrity has ...
This dissertation consists of three essays that design and evaluate the continuous audit analytics a...
Audit logs are a critical component in today’s enterprise business systems as they provide several b...
Background: Blockchain have attracted a lot of attention in the last few years. It has been describe...
In enterprise business applications, large volumes of data are generated daily, encoding business lo...
Auditing operations in multi-party data exchange, and over an arbitrary topology, is a common requir...
Organizations are testing the potential of blockchain technology in different areas, bringing implic...
Blockchain technology is already being talked about as one of the megatrends for the next years. Res...
Logging system activities are required to provide credibility and confidence in the systems used by ...
The ability of blockchain technology to improve security and transparency across a range of industri...
Usage of technology to help finance audit process is not a new instance. But since the rise of 4th i...
Part 1: AdministrationInternational audiencePublic key server is a simple yet effective way of key m...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
There has been a significant recent interest in trust-building technologies for decentralized enviro...
Blockchain is a relatively new technology that has shown a lot of possibilities. It emerged in 2009 ...
As data is having an increasingly relevant role in di erent business fields, ensuring integrity has ...
This dissertation consists of three essays that design and evaluate the continuous audit analytics a...
Audit logs are a critical component in today’s enterprise business systems as they provide several b...
Background: Blockchain have attracted a lot of attention in the last few years. It has been describe...
In enterprise business applications, large volumes of data are generated daily, encoding business lo...
Auditing operations in multi-party data exchange, and over an arbitrary topology, is a common requir...
Organizations are testing the potential of blockchain technology in different areas, bringing implic...
Blockchain technology is already being talked about as one of the megatrends for the next years. Res...
Logging system activities are required to provide credibility and confidence in the systems used by ...
The ability of blockchain technology to improve security and transparency across a range of industri...
Usage of technology to help finance audit process is not a new instance. But since the rise of 4th i...
Part 1: AdministrationInternational audiencePublic key server is a simple yet effective way of key m...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
There has been a significant recent interest in trust-building technologies for decentralized enviro...
Blockchain is a relatively new technology that has shown a lot of possibilities. It emerged in 2009 ...
As data is having an increasingly relevant role in di erent business fields, ensuring integrity has ...
This dissertation consists of three essays that design and evaluate the continuous audit analytics a...