Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,440,809 papers from all fields of science
Search
Sign In
Create Free Account
Information technology security audit
Known as:
Operating system audit
, Computer security audit
, Audit (disambiguation)
Expand
A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
Access control
Attack (computing)
Bagoes
Common Criteria
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Challenges to a Smooth-Running Data Security Audits. Case: A Finnish National Security Auditing Criteria KATAKRI
J. Rajamäki
IEEE Joint Intelligence and Security Informatics…
2014
Corpus ID: 1530886
An information security management system (ISMS) provides controls to protect organizations' most fundamental asset, information…
Expand
2014
2014
e-Health PST (privacy, security and trust) mobile networking infrastructure
Wei Liu
,
E. K. Park
,
S. S. Zhu
International Conference on Computer…
2014
Corpus ID: 13195683
As various e-Health providers gain access to new sources of electronic health data while more entities are collecting evidence of…
Expand
2013
2013
Supporting Cloud Accountability by Collecting Evidence Using Audit Agents
T. Rübsamen
,
C. Reich
IEEE International Conference on Cloud Computing…
2013
Corpus ID: 18667704
Today's cloud services process data and let it often unclear to customers, how and by whom data is collected, stored and…
Expand
Review
2012
Review
2012
Expert System for Security Audit Using Fuzzy Logic
K. Kozhakhmet
,
Gerda K. Bortsova
,
A. Inoue
,
L. Atymtayeva
Midwest Artificial Intelligence and Cognitive…
2012
Corpus ID: 6107936
Information security auditing plays key role in providing any organization’s good security level. Because of the high cost, time…
Expand
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2007
Highly Cited
2007
Effectiveness and performance of HACCP-based programs
R. Cormier
,
M. Mallet
,
S. Chiasson
,
H. Magnusson
,
G. Valdimarsson
2007
Corpus ID: 55413447
2007
2007
Information Systems Security Audit
G. Popescu
,
V. Popescu
,
C. Popescu
2007
Corpus ID: 166826000
Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2006
2006
GENERATING CITIZEN TRUST IN E-GOVERNMENT USING A TRUST VERIFICATION AGENT: A RESEARCH NOTE
R. Tassabehji
,
Tony Elliman
2006
Corpus ID: 263867105
This is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizen’s take-up…
Expand
Highly Cited
1987
Highly Cited
1987
Log files: an extended file service exploiting write-once storage
R. Finlayson
,
D. Cheriton
Symposium on Operating Systems Principles
1987
Corpus ID: 11007417
A log service provides efficient storage and retrieval of data that is written sequentially (append-only) and not subsequently…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE