Essays about: "Audit trail"

Found 5 essays containing the words Audit trail.

  1. 1. Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Hannes Michel; [2019]
    Keywords : Audit log; Data visualization; Data semantics; User-centered; Event data; Spårbarhetslogg; datavisualisering; rättssystemet; data logg; logg;

    Abstract : Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitive information, are registered and sent to an audit log. The audit log contains log entries that consist of information regarding the events that occur by the performing user. READ MORE

  2. 2. Blockchain in audit trails : An investigation of how blockchain can help auditors to implement audit trails

    University essay from Högskolan i Jönköping/Internationella Handelshögskolan

    Author : Emma Sahlin; Rebecka Levenby; [2018]
    Keywords : Journal entries; Audit trail; Blockchain; Distributed; Ledger; Cryptographically;

    Abstract : Background: Blockchain have attracted a lot of attention in the last few years. It has been described as a technology that will increase the effectiveness of monitoring and improve the auditability of transactions which would have great implications for accountants and auditors. READ MORE

  3. 3. A new programming model for enterprise software : Allowing for rapid adaption and supporting maintainability at scale

    University essay from KTH/Elkraftteknik

    Author : Marc Höffl; [2017]
    Keywords : Enterprise Software; Microservices; Event Sourcing; Command Query Responsibility Segregation CQRS ; Distributed Systems; Process Systems; Enterprise Resource Planning ERP ; Business Process Re-engineering BPR ; Transparency; Adaptability; Testability; Reparability; Seneca.js; Hemera.js; Enterprise Software Patterns; Pattern Matching; Transport Independence; Additivity;

    Abstract : Companies are under constant pressure to adapt and improve their processes to staycompetitive. Since most of their processes are handled by software, it also needs toconstantly change. Those improvements and changes add up over time and increase thecomplexity of the system, which in turn prevents the company from further adaption. READ MORE

  4. 4. Re-authentication of Critical Operations

    University essay from Institutionen för systemteknik

    Author : Marwan Yachouh; [2002]
    Keywords : Informationsteknik; Computer Security; Distributed Systems; Access-control; Certificates; Re-authentication Certificates; Cryptography.; Informationsteknik;

    Abstract : This is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. READ MORE

  5. 5. Viewing patients' x-rays in the radiologist's home

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Annicka Gunnarsson; Eva Lindros; Jeff Winter; [2002]
    Keywords : security; säkerhet; Internet; network; nätverk; health care; hälsovård; x-ray; röntgen.;

    Abstract : Our assignment was to present a report to the radiology clinic at the County Hospital in Blekinge, evaluating the risks inherent in transferring patient information via Internet between the radiologist?s home and the hospital and presenting suggestions to the clinic for mechanisms by which the privacy and personal health of the patient can be ensured. Our aim was to investigate how to maintain an acceptable level of security to ensure that the patient?s privacy and security are not threatened. READ MORE