default search action
Integrity and Internal Control in Information Systems 2003: Lausanne, Switzerland
- Sushil Jajodia, Leon Strous:
Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland. IFIP 140, Springer 2004, ISBN 978-1-4020-7900-9 - Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane:
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. 1-11 - Sebastian Höhn, Jan Jürjens:
Automated Checking of SAP Security Permisisons. 13-30 - David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi:
A Formal Analysis of a Digital Signature Architecture. 31-47 - Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France:
Using Parameterized UML to Specify and Compose Access Control Models. 49-65 - Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Integrity in Multimedia Surveillance. 67-81 - Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A Learning-based Approach to Information Release Control. 83-105 - Elmari Pretorius, Basie von Solms:
Information Security Governance using ISO 17799 and COBIT. 107-113 - Alexandre Aellig, Philippe Oechslin:
Tracing Attacks and Restoring Integrity with Lascar. 115-124 - Indrajit Ray, Junxing Zhang:
A Secure Multi-Sited Version Control System. 125-141 - Herman Balsters, Bert O. de Brock:
Integration of Integrity Constraints in Database Federations. 143-158 - Binling Jin, Suzanne M. Embury:
Reducing Disruption in Time-Tabled Condition Monitoring. 159-176 - Yanjun Zuo, Brajendra Panda:
A Service Oriented System Based Information Flow Model for Damage Assessment. 177-194 - Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman:
An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. 195-208 - Solange Ghernaouti-Helie:
From Security Culture to Effective E-Security Solutions. 209-218 - Jan Chomicki:
Consistent Query Answering - Recent Developments and Future Directions. 219-239 - William List:
Role of Certification in Meeting Organisation Security Requirements. 241-248 - Bhavani Thuraisingham:
Grand Challenges in Data Integrity and Quality: Panel Discussion. 249-253
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.