{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:39Z","timestamp":1750307679272,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533105","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"364-367","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Logging key assurance indicators in business processes"],"prefix":"10.1145","author":[{"given":"Fabio","family":"Massacci","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Trento"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Artsiom","family":"Yautsiukhin","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Trento"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International convergence of capital measurement and capital standards","author":"Basel Committee on Banking Supervision","year":"2006","unstructured":"Basel Committee on Banking Supervision , International convergence of capital measurement and capital standards , 2006 . Basel Committee on Banking Supervision, International convergence of capital measurement and capital standards, 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703986"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_4"},{"key":"e_1_3_2_1_6_1","unstructured":"Fox Business Futures trader responsible for $7b fraud. http:\/\/www.foxbusiness.com.  Fox Business Futures trader responsible for $7b fraud. http:\/\/www.foxbusiness.com."},{"key":"e_1_3_2_1_7_1","volume-title":"AusGrid'06","author":"Holt J.","year":"2006","unstructured":"J. Holt , Logcrypt : forward security and public verification for secure audit logs , AusGrid'06 , 2006 . J. Holt, Logcrypt: forward security and public verification for secure audit logs, AusGrid'06, 2006."},{"volume-title":"www.isaca.org\/cobit\/","year":"2008","key":"e_1_3_2_1_8_1","unstructured":"ISACA, CobiT , www.isaca.org\/cobit\/ , 2008 . ISACA, CobiT, www.isaca.org\/cobit\/, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"IT Control Objectives for BASEL II: The important of Goverance and Risk Management for Complience.","author":"EC.","year":"2007","unstructured":"ISO\/I EC. ISO 17799 , 2001 IT Governance Institute , IT Control Objectives for BASEL II: The important of Goverance and Risk Management for Complience. , 2007 . http:\/\/www.isaca.org ISO\/IEC. ISO 17799, 2001 IT Governance Institute, IT Control Objectives for BASEL II: The important of Goverance and Risk Management for Complience., 2007. http:\/\/www.isaca.org"},{"key":"e_1_3_2_1_10_1","volume-title":"IT Control Objectives for BASEL II. The important of Goverance and Risk Management for Complience","author":"IT Governance Institute","year":"2007","unstructured":"IT Governance Institute . IT Control Objectives for BASEL II. The important of Goverance and Risk Management for Complience ., 2007 . http:\/\/www.isaca.org IT Governance Institute. IT Control Objectives for BASEL II. The important of Goverance and Risk Management for Complience., 2007. http:\/\/www.isaca.org"},{"key":"e_1_3_2_1_11_1","volume-title":"RAID'99","author":"Kelsey J.","year":"1999","unstructured":"J. Kelsey and B. Schneier , Minimizing bandwidth for remote access to cryptographically protected audit logs , RAID'99 , 1999 . J. Kelsey and B. Schneier, Minimizing bandwidth for remote access to cryptographically protected audit logs, RAID'99, 1999."},{"key":"e_1_3_2_1_12_1","unstructured":"Permanent Subcommettee on Inverstigations of the Comittee on Governmental Affairs of the United States Senate The Role of The Board of Directors in Enron's Collapse http:\/\/news.findlaw.com\/hdocs\/docs\/enron\/senpsi70802rpt.pdf 2002.  Permanent Subcommettee on Inverstigations of the Comittee on Governmental Affairs of the United States Senate The Role of The Board of Directors in Enron's Collapse http:\/\/news.findlaw.com\/hdocs\/docs\/enron\/senpsi70802rpt.pdf 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","author":"Schneier B.","year":"1998","unstructured":"B. Schneier and J. Kelsey , Cryptographic support for secure logs on untrusted machines , USENIX Security Symposium , 1998 . B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, USENIX Security Symposium, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_15_1","unstructured":"United States Districs Court Southern Districs of New York United States of America vs. Bernard J. Ebbers http:\/\/news.findlaw.com\/hdocs\/docs\/worldcom\/usebbers504ind3s.pdf 2004.  United States Districs Court Southern Districs of New York United States of America vs. Bernard J. Ebbers http:\/\/news.findlaw.com\/hdocs\/docs\/worldcom\/usebbers504ind3s.pdf 2004."},{"volume-title":"Report to the Board of Allied Irish Banks, p.l.c","key":"e_1_3_2_1_16_1","unstructured":"Wachtell, Lipton, Rosen and Katz , Report to the Board of Allied Irish Banks, p.l.c ., Allfirst Financial Inc. and Allfirst Bank Concerning Currency Trading Losses . Available from http:\/\/www.aibgroup.com, March 2002. Wachtell, Lipton, Rosen and Katz, Report to the Board of Allied Irish Banks, p.l.c., Allfirst Financial Inc. and Allfirst Bank Concerning Currency Trading Losses. Available from http:\/\/www.aibgroup.com, March 2002."},{"key":"e_1_3_2_1_17_1","volume-title":"ISOC NDSS'04","author":"Waters B.","year":"2004","unstructured":"B. Waters , D. Balfanz , G. Durfee and D. Smetters , Building an encrypted and searchable audit log , ISOC NDSS'04 , 2004 . B. Waters, D. Balfanz, G. Durfee and D. Smetters, Building an encrypted and searchable audit log, ISOC NDSS'04, 2004."}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":15,"alternative-id":["10.1145\/1533057.1533105","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533105","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}