- Jan Chomicki:
Consistent Query Answering - Recent Developments and Future Directions. IICIS 2003: 219-239 - Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane:
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. IICIS 2003: 1-11 - Solange Ghernaouti-Helie:
From Security Culture to Effective E-Security Solutions. IICIS 2003: 209-218 - Sebastian Höhn, Jan Jürjens:
Automated Checking of SAP Security Permisisons. IICIS 2003: 13-30 - Binling Jin, Suzanne M. Embury:
Reducing Disruption in Time-Tabled Condition Monitoring. IICIS 2003: 159-176 - Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Integrity in Multimedia Surveillance. IICIS 2003: 67-81 - William List:
Role of Certification in Meeting Organisation Security Requirements. IICIS 2003: 241-248 - Elmari Pretorius, Basie von Solms:
Information Security Governance using ISO 17799 and COBIT. IICIS 2003: 107-113 - Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France:
Using Parameterized UML to Specify and Compose Access Control Models. IICIS 2003: 49-65 - Indrajit Ray, Junxing Zhang:
A Secure Multi-Sited Version Control System. IICIS 2003: 125-141 - Bhavani Thuraisingham:
Grand Challenges in Data Integrity and Quality: Panel Discussion. IICIS 2003: 249-253 - Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman:
An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. IICIS 2003: 195-208 - Yanjun Zuo, Brajendra Panda:
A Service Oriented System Based Information Flow Model for Damage Assessment. IICIS 2003: 177-194 - Michael Gertz:
Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany. IFIP Conference Proceedings 251, Kluwer 2003, ISBN 1-4020-7473-5 [contents] - 2002
- Stefan Böttcher:
Concurrent Checking of Global Cross-database Integrity Constraints. IICIS 2002: 3-19 - Cristina Buchholz:
The Impact of Web Services on Audit. IICIS 2002: 151-172 - David Chadwick:
Stop that Subversive Spreadsheet! IICIS 2002: 205-211 - Grenville J. Croll:
A Typical Model Audit Approac. IICIS 2002: 213-219 - Geri Georg, Robert B. France, Indrakshi Ray:
Designing High Integrity Systems Using Aspects. IICIS 2002: 37-57 - Michael Gertz:
Opportunities and Challenges in Tracing Security Breaches. IICIS 2002: 223-226 - Michael Gertz, George Csaba:
Monitoring Mission Critical Data for Integrity and Availability. IICIS 2002: 189-201 - Binling Jin, Suzanne M. Embury:
Increasing the Accuracy of Time-tabled Condition Monitoring. IICIS 2002: 21-35 - Steffen Jurk, Mira Balaban:
Towards Effect Preservation of Updates with Loops. IICIS 2002: 59-75 - Fred de Koning:
Application Controls in a Client/Server Environment. IICIS 2002: 77-97 - Detlef Kraus:
Integrity Mechanisms in German and International Payment Systems. IICIS 2002: 175-187 - Mark Pollitt:
The Very Brief History of Digital Evidence Standards. IICIS 2002: 135-143 - Elmarie Kritzinger-von Solms, Leon Strous:
Information Security: A Corporate Governance Issue. IICIS 2002: 115-133 - Stefano Spaccapietra, Christelle Vangenot, Christine Parent:
Multi-representation: A New Paradigm for Databases. IICIS 2002: 143-149 - Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka:
Protecting Java Component Integrity Against Trojan Horse Programs. IICIS 2002: 99-113 - Michael Gertz, Erik Guldentops, Leon Strous:
Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium. IFIP Conference Proceedings 211, Kluwer 2002, ISBN 1-4020-7005-5 [contents]