- 2006
- Paul Dowland, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang:
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]. IFIP 193, Springer 2006, ISBN 978-0-387-29826-9 [contents] - 2004
- Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study. IICIS 2004: 157-173 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
A Policy Framework for Access Management in Federated Information Sharing. IICIS 2004: 95-120 - Andrzej Bialas:
A UML Approach in the ISMS Implementation. IICIS 2004: 285-297 - James R. Conrad, Paul W. Oman, Carol Taylor:
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC. IICIS 2004: 141-156 - Vassilis Dimopoulos, Steven Furnell:
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises. IICIS 2004: 267-283 - Jean-Noël Ezingeard, David William Birchall:
Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002. IICIS 2004: 1-20 - Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy:
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper). IICIS 2004: 41-55 - Corey Hirsch:
Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems. IICIS 2004: 71-82 - Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos:
How Much Should We Pay for Security? (Invited Paper). IICIS 2004: 59-69 - Peng Liu:
Attack Aware Integrity Control in Databases (Invited Abstract). IICIS 2004: 301 - Oleksiy Mazhelis, Seppo Puuronen:
Characteristics and Measures for Mobile-Masquerader Detection. IICIS 2004: 303-318 - Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner:
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions. IICIS 2004: 319-333 - Malcolm Robert Pattinson, Grantley Anderson:
Risk Communication, Risk Perception and Information Security. IICIS 2004: 175-184 - Shaun Posthumus, Rossouw von Solms:
A Responsibility Framework for Information Security. IICIS 2004: 205-221 - Rahul Rastogi, Rossouw von Solms:
Information Security Governance - A Re-Definition. IICIS 2004: 223-236 - Arnon Rosenthal:
Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda. IICIS 2004: 355-370 - Reijo Savola, Juhani Anttila, Anni Sademies, Jorma Kajava, Jarkko Holappa:
Measurement of Information Security in Processes and Products. IICIS 2004: 249-265 - Janine L. Spears:
A Holistic Risk Analysis Method for Identifying Information Security Risks. IICIS 2004: 185-202 - Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin:
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). IICIS 2004: 21-39 - Paul Thompson:
Semantic Information Infrastructure Protection (Invited Abstract). IICIS 2004: 371 - Chao Yao, William H. Winsborough, Sushil Jajodia:
A Hierarchical Release Control Policy Framework. IICIS 2004: 121-137 - Louise Yngström:
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper). IICIS 2004: 237-245 - Omar Zakaria:
Employee Security Perception in Cultivating Information Security Culture. IICIS 2004: 83-92 - Yanjun Zuo, Brajendra Panda:
A Trust-Based Model for Information Integrity in Open Systems. IICIS 2004: 337-354 - Sushil Jajodia, Leon Strous:
Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland. IFIP 140, Springer 2004, ISBN 978-1-4020-7900-9 [contents] - 2003
- Alexandre Aellig, Philippe Oechslin:
Tracing Attacks and Restoring Integrity with Lascar. IICIS 2003: 115-124 - Herman Balsters, Bert O. de Brock:
Integration of Integrity Constraints in Database Federations. IICIS 2003: 143-158 - David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi:
A Formal Analysis of a Digital Signature Architecture. IICIS 2003: 31-47 - Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A Learning-based Approach to Information Release Control. IICIS 2003: 83-105