BBox: a distributed secure log architecture
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
On the exploitation of process mining for security audits: the conformance checking case
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Hi-index | 4.10 |
IT audits validate the security, integrity, and privacy of information systems.