Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System with Text and Graphical Data Using Widely Available Software

Abstract

In prior work we described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the security and versioning features of database architecture together with those of image-supported electronic document information capture. We present herein the security and audit trail features of our construct. Unique usernames and passwords are used at the operating system level to enforce client validation and control access to the database system via an electronic signature using a Boolean logic algorithm. We used the database domain to capture original data and any changes to the data, developing an audit trail displaying identification information. Version controlled and change tracked electronic documents can be retrieved through the client side web interface to enable direct search operations, thus uncoupling the client from database query languages.

Share and Cite:

Beland, K. , Larson, K. , Rowley, T. , Mueller, M. , Smith, C. , Rizzo, A. , Valandra, D. and Rendell, M. (2014) Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System with Text and Graphical Data Using Widely Available Software. Journal of Software Engineering and Applications, 7, 713-719. doi: 10.4236/jsea.2014.78066.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Sprague, R. (1995) Electronic Document Management: Challenges and Opportunities for Information Systems Managers. MIS Quarterly, 19, 29-49. http://dx.doi.org/10.2307/249710
[2] Topi, H., Valacich, J.S. and Hoffer, J.A. (2005) The Effects of Task Complexity and Time Availability Limitations on Human Performance in Database Query Tasks. International Journal of Human-Computer Studies, 62, 349-379. http://dx.doi.org/10.1016/j.ijhcs.2004.10.003
[3] Fielding, R., Irvine, U. and Gettys, J. (1999) Hypertext Transfer Protocol—HTTP/1.1.
[4] O’Tuathail, E. and Rose, M. (2006) Using the Simple Object Access Protocol (SOAP) in Blocks Extensible Exchange Protocol (BEEP).
[5] Rescorla, E. and Schiffman, A. (1999) Secure Hypertext Transfer Protocol (S-HTTP).
[6] Wang, C., Wang, Q., Ren, K. and Lou, W. (2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. 2010 Proceedings IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.
[7] Fraser, N. (2012) Diff, Match and Patch Library.
[8] Kher, A. (2004) The XML Diff and Patch GUI Tool.
[9] Dix, A. and Miles, V.C. (1992) Version Control for Asynchronous Group Work. Department of Computer Science, University of York, York.
[10] Collins-Sussman, B., Fitzpatrick, B. and Pilato, M. (2004) Version Control with Subversion. O’Reilly, Sebastopol.
[11] (2004) Audit Documentation. Auditing Standard No. 3.
[12] Bronson, S.N., Hogan, C.E., Johnson, M.F. and Ramesh, K. (2011) The Unintended Consequences of PCAOB Auditing Standard Nos. 2 and 3 on the Reliability of Preliminary Earnings Releases. Journal of Accounting and Economics, 51, 95-114. http://dx.doi.org/10.1016/j.jacceco.2010.06.002

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.