The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
This paper presents the results of a bibliometric study about the evolution of research on Continuous Auditing. This study has as main motivation to find reasons for the very slow evolvement of research on this topic. In addition, Continuous Auditing is one of the features of the emerging concept of Continuous Assurance. Thus, considering that Continuous Assurance represents numerous advantages for...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns...
Cloud-based object storage is provided as a cost-efficient, scalable, and durable service for accessing and storing objects through web technologies. With years of development and successful deployment, it has been widely adopted by individuals and organizations. Besides its advantages, there are several major concerns, such as, manageability, operation performance from a user perspective, convenience...
This paper aims to present a repository which has as main objective to store and manage data derived from internal control mechanisms. The proposed repository receives information about the execution of organizational transactions which were collected by internal control mechanisms in an ERP database, thereby constituting an important tool for continuous monitoring of organizational transactions....
Integration of data from heterogeneous data sources is one of several technical challenges during the tunnel construction. BIM and relational database have maken their efforts for tunnel data organization, but they are not qualified for tunnel problem reasoning. This paper proposes a tunnel data organization method driven by Ontology, which is suitable for data reorganization as well as reasoning...
Process enactment technology provides native tools and add-ons for monitoring, such as APIs and monitoring consoles, which are usually highly entangled with the underlying process enactment logic and not customizable by process users. In such a case, all users access the same set of monitoring data and functions and process management resources may be allocated for monitoring concerns not of interest...
Sometimes information systems fail or have operational and communication problems because designers may not have knowledge of the domain which is intended to be modeled. The same happens with systems for monitoring. Thus, an ontological model is needed to represent the organizational domain, which is intended to be monitored in order to develop an effective monitoring system. In this way, the purpose...
Insider threats are a growing problem in today's organizations. Detecting such attacks is especially challenging because most system owners and system administrators use networks to remotely manage the systems they are responsible for. In previous work, we introduced the Autonomic Violation Prevention System (AVPS) that has a scalable architecture to deal with such threats. This system uses low level...
Value of software log file analysis has been constantly increasing with the value of information to organizations. Log management tools still have a lot to deliver in order to empower their customers with the true strength of log information. In addition to the traditional uses such as testing software functional conformance, troubleshooting and performance benchmarking, log analysis has proven its...
The Insider Threat Security Reference Architecture, ITSRA, provides an enterprise wide solution to insider threat. The architecture consists of four security layers -- Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer in order to address insider attacks. Each layer does not function in isolation or independently of other layers. Rather, the...
Many large enterprises are wasting vast amounts of electricity due to computers that are powered-up yet unused for considerable periods of time. It is unfortunate that although the facilities to power management are already available, many administrators are reluctant to adopt power saving features. This paper first highlights the scale of electricity wastage and goes on to consider the issues associated...
This paper mainly introduces the cyber infrastructure and e-Science application practices of Chinese Academy of Sciences. We present current situation of the cyber infrastructure from research network infrastructure, high performance computing environment, scientific data infrastructure, collaboration environment and digital library. We briefly introduce e-Science application demonstrations supported...
This paper proposes state-oriented approach for knowledge management system, especially for risk management of nuclear power plants. The knowledge model is a kind of state flow in which each state is changed by actions and each action is activated by actors or states. To construct such knowledge base, huge manuals have been analyzed by a unique natural language processing algorithm, called a functional...
Organizing a racing event is not an easy task. Organizing a racing event that spans across multiple days and whose participants have to run (on foot) for 100 miles is even harder. In such events many checkpoints are needed to provide runners with access to food, water and, if necessary, medical assistance. At these checkpoints updates on participants' health status and race timings need to be sent...
Resources sharing is the main concerns of grid computing. With an in-depth study of the grid resource management models, a five-layer grid resource management model is proposed to deal with the problems and defects of grid resource management. The hierarchy structure of the model can not only mask the diversity of grid resources, but also increase the security of sharing, thus achieving the scalability...
Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not...
Anti-money laundering (AML) has attracted highly focus from the mainland China government recently since it has been deeply involved with the faiths of the nation, economic stability, combating the serious flooding of nationwide corruption offences, especial the field of organized crimes. Due to the backward situation of AML mechanism in China, it is of great significance to develop a set of AML intelligence...
As information technology becomes more important to build enterprises' competitive advantage, transforming their IT organization from technology provider to service provider by introducing IT service management (ITSM) processes is also becoming imperative. Configuration management is one of processes in ITSM which plays a key role for successful implementing ITSM. In this paper, we give a set of suggested...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.