We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,485 results
  1. The right to audit and power asymmetries in algorithm auditing

    In this paper, we engage with and expand on the keynote talk about the “Right to Audit” given by Prof. Christian Sandvig at the International...

    Aleksandra Urman, Ivan Smirnov, Jana Lasser in EPJ Data Science
    Article Open access 07 March 2024
  2. Practical cloud storage auditing using serverless computing

    Cloud storage auditing research is dedicated to solving the data integrity problem of outsourced storage on the cloud. In recent years, researchers...

    Fei Chen, Jianquan Cai, ... **aofeng Liao in Science China Information Sciences
    Article 19 October 2023
  3. Legal Auditing

    In this chapter, we specify the business requirements and propose the solution concept for legal auditing. Artificial intelligence training and...
    Chapter 2024
  4. Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model

    With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing...

    R. Prasanna Kumar, Showri Rayalu Bandanadam in International Journal of Information Technology
    Article 20 November 2023
  5. Cloud auditing and authentication scheme for establishing privacy preservation

    Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data...

    Rajesh Bingu, S. Jothilakshmi in Multimedia Tools and Applications
    Article 16 October 2023
  6. Auditing of AI: Legal, Ethical and Technical Approaches

    AI auditing is a rapidly growing field of research and practice. This review article, which doubles as an editorial to Digital Society’s topical...

    Jakob Mökander in Digital Society
    Article Open access 08 November 2023
  7. General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme

    In the applications of cloud storage, ensuring data’s integrity is an important research problem and kinds of remote integrity auditing protocols...

    **g Song, **yong Chang in Cluster Computing
    Article 06 February 2024
  8. A generic framework for blockchain-assisted on-chain auditing for off-chain storage

    In recent times, blockchain-based data auditing protocols have emerged as a cutting-edge area of study. Nevertheless, a conspicuous dearth of a...

    Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin in International Journal of Information Security
    Article 18 April 2024
  9. Identity-based remote data integrity auditing from lattices for secure cloud storage

    In recent years, cloud storage services have risen widely, and how to ensure the integrity of outsourced data in cloud setting catches more and more...

    Songrun Yang, **yong Chang in Cluster Computing
    Article 13 February 2024
  10. Black-Box Testing and Auditing of Bias in ADM Systems

    For years, the number of opaque algorithmic decision-making systems (ADM systems) with a large impact on society has been increasing: e.g., systems...

    Tobias D. Krafft, Marc P. Hauer, Katharina Zweig in Minds and Machines
    Article Open access 25 May 2024
  11. Secure cloud storage auditing with deduplication and efficient data transfer

    To guarantee the integrity of cloud data, plenty of cloud storage auditing schemes are proposed. In cloud storage, when a company is purchased by...

    **gze Yu, Wenting Shen in Cluster Computing
    Article 23 June 2023
  12. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage

    With the escalation of multimedia data, cloud technology has played a very important role in its management with its promising computing and storage...

    Deepika Gautam, Sunil Prajapat , ... Willy Susilo in Cluster Computing
    Article 07 April 2024
  13. Auditing large language models: a three-layered approach

    Large language models (LLMs) represent a major advance in artificial intelligence (AI) research. However, the widespread use of LLMs is also coupled...

    Jakob Mökander, Jonas Schuett, ... Luciano Floridi in AI and Ethics
    Article Open access 30 May 2023
  14. A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services

    The convergence with the emerging digital twin technology has been envisaged as the looming of a smart cloud-based healthcare system. Precision clone...

    Deepika Kumari, Pankaj Kumar, Sunil Prajapat in Cluster Computing
    Article 19 July 2023
  15. They shall be fair, transparent, and robust: auditing learning analytics systems

    In the near future, systems, that use Artificial Intelligence (AI) methods, such as machine learning, are required to be certified or audited for...

    Katharina Simbeck in AI and Ethics
    Article Open access 11 May 2023
  16. More or less discrimination? Practical feasibility of fairness auditing of technologies for personnel selection

    The use of technologies in personnel selection has come under increased scrutiny in recent years, revealing their potential to amplify existing...

    Helena Mihaljević, Ivana Müller, ... Maximilian von Grafenstein in AI & SOCIETY
    Article Open access 24 July 2023
  17. Distributional constraint discovery for intelligent auditing

    Constraint discovery in relational databases aims to find constraints that express dependency relationships among a set of attributes and has...

    Wentao Hu, Dawei Jiang, ... Gang Chen in Knowledge and Information Systems
    Article 07 August 2023
  18. Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism

    Cloud computing can be used to access and storing data and delivery of different services over the internet. Using cloud storage, users can remotely...
    M. Mageshwari, R. Naresh in Smart Trends in Computing and Communications
    Conference paper 2023
  19. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain

    Data auditing permits data owners to confirm the reliability of their personal information without obtaining it from an unsafe cloud. Advertising...

    Shruthi Gangadharaiah, Purohit Shrinivasacharya in Multimedia Tools and Applications
    Article 09 February 2024
  20. Continuous Auditing of Artificial Intelligence: a Conceptualization and Assessment of Tools and Frameworks

    Artificial intelligence (AI), which refers to both a research field and a set of technologies, is rapidly growing and has already spread to...

    Matti Minkkinen, Joakim Laine, Matti Mäntymäki in Digital Society
    Article Open access 04 October 2022
Did you find what you were looking for? Share feedback.