default search action
Integrity and Internal Control in Information Systems 2002: Bonn, Germany
- Michael Gertz:
Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany. IFIP Conference Proceedings 251, Kluwer 2003, ISBN 1-4020-7473-5
Refereed Papers
- Stefan Böttcher:
Concurrent Checking of Global Cross-database Integrity Constraints. IICIS 2002: 3-19 - Binling Jin, Suzanne M. Embury:
Increasing the Accuracy of Time-tabled Condition Monitoring. IICIS 2002: 21-35 - Geri Georg, Robert B. France, Indrakshi Ray:
Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57 - Steffen Jurk, Mira Balaban:
Towards Effect Preservation of Updates with Loops. IICIS 2002: 59-75 - Fred de Koning:
Application Controls in a Client/Server Environment. IICIS 2002: 77-97 - Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka:
Protecting Java Component Integrity Against Trojan Horse Programs. IICIS 2002: 99-113 - Elmarie Kritzinger-von Solms, Leon Strous:
Information Security: A Corporate Governance Issue. IICIS 2002: 115-133
Invited Papers
- Mark Pollitt:
The Very Brief History of Digital Evidence Standards. IICIS 2002: 135-143 - Stefano Spaccapietra, Christelle Vangenot, Christine Parent:
Multi-representation: A New Paradigm for Databases. IICIS 2002: 143-149 - Cristina Buchholz:
The Impact of Web Services on Audit. IICIS 2002: 151-172
Vendor White Papers
- Detlef Kraus:
Integrity Mechanisms in German and International Payment Systems. IICIS 2002: 175-187 - Michael Gertz, George Csaba:
Monitoring Mission Critical Data for Integrity and Availability. IICIS 2002: 189-201
Tutorial "The Subversive Spreadsheet"
- David Chadwick:
Stop that Subversive Spreadsheet! IICIS 2002: 205-211 - Grenville J. Croll:
A Typical Model Audit Approac. IICIS 2002: 213-219
Panel
- Michael Gertz:
Opportunities and Challenges in Tracing Security Breaches. IICIS 2002: 223-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.