View Document Preview and Link
Document Date: 2011-11-15 03:32:08 Open Document File Size: 171,62 KB Share Result on Facebook
City Efficient Audit / New York / / Company IBM / Continuous Assurance Systems / Enron / EMC / NetApp / Database Systems / Cost Effective Management / Creative Commons / Surety LLC / WorldCom / / Country United States / / / Event Reorganization / / Facility Computer Science The University of Arizona P.O. Box / University of Illinois / University of Arizona / / IndustryTerm forensic analysis protocol / forensic analysis protocols / storage devices / protection-software/snaplock.html / enterprise-wide solution / interwoven chain / forensic tools / assurance technology / extant forensic algorithms / file systems / fundamental algorithmic tools / forensic analysis algorithms / forensic protocols / forensic analysis tools / digital notarization services / enterprise-wide information accountability solution / forensic algorithms / record management systems / detection algorithm / read-only file systems / a3D algorithm / / Organization National Science Foundation / VLDB Endowment / University of Illinois / Department of Computer Science / U.S. Food and Drug Administration / F.D.A. / Service of Information Accountability Kyriacos E. Pavlou Department / Department of Health / University of Arizona / / Person G. Wingate / Richard T. Snodgrass / Radu Sion / Joseph Watkins / Marianne Winslett / Nirav Merchant / Soumyadeb Mitra / Peter Downey / / / Position editor / auditor / Scientist / author / Chief Security Officer / / ProvinceOrState Illinois / New York / Arizona / / PublishedMedium Communications of the ACM / Journal of Cryptology / Lecture Notes in Computer Science / / Technology three algorithms / Peer-to-Peer / previous algorithms / forensic analysis protocols / forensic analysis protocol / assurance technology / secret key / forensic protocols / html / Operating Systems / DBMS / Tiled Bitmap Forensic Analysis Algorithm / pdf / forensic analysis algorithms / a3D Algorithm / extant forensic algorithms / cryptography / existing forensic analysis algorithms / Static-Level a3D Algorithm / forensic algorithms / http / detection algorithm / / URL http / SocialTag