In prior work we described
techniques used to capture, store, and retrieve narrative data forms from a
database using widely available off the shelf software. This concept makes use
of the security and versioning features of database architecture together with
those of image-supported electronic document information capture. We present
herein the security and audit trail features of our construct. Unique usernames
and passwords are used at the operating system level to enforce client
validation and control access to the database system via an electronic
signature using a Boolean logic algorithm. We used the database domain to
capture original data and any changes to the data, developing an audit trail
displaying identification information. Version controlled and change tracked
electronic documents can be retrieved through the client side web interface to
enable direct search operations, thus uncoupling the client from database query
Cite this paper
Beland, K. , Larson, K. , Rowley, T. , Mueller, M. , Smith, C. , Rizzo, A. , Valandra, D. and Rendell, M. (2014) Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System with Text and Graphical Data Using Widely Available Software. Journal of Software Engineering and Applications
, 713-719. doi: 10.4236/jsea.2014.78066
 Sprague, R. (1995) Electronic Document Management: Challenges and Opportunities for Information Systems Managers. MIS Quarterly, 19, 29-49. http://dx.doi.org/10.2307/249710
 Topi, H., Valacich, J.S. and Hoffer, J.A. (2005) The Effects of Task Complexity and Time Availability Limitations on Human Performance in Database Query Tasks. International Journal of Human-Computer Studies, 62, 349-379.
 Fielding, R., Irvine, U. and Gettys, J. (1999) Hypertext Transfer Protocol—HTTP/1.1.
 O’Tuathail, E. and Rose, M. (2006) Using the Simple Object Access Protocol (SOAP) in Blocks Extensible Exchange Protocol (BEEP).
 Rescorla, E. and Schiffman, A. (1999) Secure Hypertext Transfer Protocol (S-HTTP).
 Wang, C., Wang, Q., Ren, K. and Lou, W. (2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. 2010 Proceedings IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.
 Fraser, N. (2012) Diff, Match and Patch Library.
 Kher, A. (2004) The XML Diff and Patch GUI Tool.
 Dix, A. and Miles, V.C. (1992) Version Control for Asynchronous Group Work. Department of Computer Science, University of York, York.
 Collins-Sussman, B., Fitzpatrick, B. and Pilato, M. (2004) Version Control with Subversion. O’Reilly, Sebastopol.
 (2004) Audit Documentation. Auditing Standard No. 3.
 Bronson, S.N., Hogan, C.E., Johnson, M.F. and Ramesh, K. (2011) The Unintended Consequences of PCAOB Auditing Standard Nos. 2 and 3 on the Reliability of Preliminary Earnings Releases. Journal of Accounting and Economics, 51, 95-114. http://dx.doi.org/10.1016/j.jacceco.2010.06.002