{"title":"基于会计信息系统的数据“审计”研究","authors":"Tao Li, Chao Liu","doi":"10.1109/ICEE.2010.610","DOIUrl":null,"url":null,"abstract":"In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry point, we want to construct a data \"audit\" model which draw on the experience of relevant principles of the black box in the aircraft, using the knowledge of accounting and auditing as well as relevant technologies about data encryption, digital signatures in computer data processing under the accounting information system. The establishment of this model can be achieved on the review, verification and validation of the source database, which in order to achieve the data in disguise from \"audit\". Once the source data in the database have been illegally tampered, you can use the data in the data \"audit\" model to verify and restore the source data in the source database, which can verify the security of the accounting data in source database and realize the source database data protection from another perspective.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Data “Audit” Research Based on the Accounting Information System\",\"authors\":\"Tao Li, Chao Liu\",\"doi\":\"10.1109/ICEE.2010.610\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry point, we want to construct a data \\\"audit\\\" model which draw on the experience of relevant principles of the black box in the aircraft, using the knowledge of accounting and auditing as well as relevant technologies about data encryption, digital signatures in computer data processing under the accounting information system. The establishment of this model can be achieved on the review, verification and validation of the source database, which in order to achieve the data in disguise from \\\"audit\\\". Once the source data in the database have been illegally tampered, you can use the data in the data \\\"audit\\\" model to verify and restore the source data in the source database, which can verify the security of the accounting data in source database and realize the source database data protection from another perspective.\",\"PeriodicalId\":420284,\"journal\":{\"name\":\"2010 International Conference on E-Business and E-Government\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on E-Business and E-Government\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEE.2010.610\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on E-Business and E-Government","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEE.2010.610","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data “Audit” Research Based on the Accounting Information System
In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry point, we want to construct a data "audit" model which draw on the experience of relevant principles of the black box in the aircraft, using the knowledge of accounting and auditing as well as relevant technologies about data encryption, digital signatures in computer data processing under the accounting information system. The establishment of this model can be achieved on the review, verification and validation of the source database, which in order to achieve the data in disguise from "audit". Once the source data in the database have been illegally tampered, you can use the data in the data "audit" model to verify and restore the source data in the source database, which can verify the security of the accounting data in source database and realize the source database data protection from another perspective.