- Vijayalakshmi Atluri:
Modification of Integrity Constraints Through Knowledge Discovery. IICIS 1998: 191-209 - Margaret E. van Biene-Hershey:
Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. IICIS 1998: 57-74 - Frédéric Cuppens, Claire Saurel:
A Logical Formalization of Integrity Policies for Database Management Systems. IICIS 1998: 231-254 - Michael Gertz:
Managing Data Quality and Integrity in Federated Databases. IICIS 1998: 211-230 - L. G. Gomez, Susan Darling Urban:
Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. IICIS 1998: 19-39 - Marcel Korver:
TOP: An Example of Complex Application Controls. IICIS 1998: 75-101 - Vijay V. Mandke, Madhavan K. Nayar:
Design Basis for Achieving Information Integrity - a Feedback Control System Approach. IICIS 1998: 169-190 - Kamalasen Rajalingham, David Chadwick:
Integrity Control of Spreadsheets: Organisation & Tools. IICIS 1998: 147-168 - Arnon Rosenthal, Edward Sciore:
Propagating Integrity Information among Interrelated Databases. IICIS 1998: 5-18 - Giovanni Rumolo, Sushil Jajodia:
Algebra for Databases with Explicit Markings of Damaged Data. IICIS 1998: 103-129 - Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous:
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998. IFIP Conference Proceedings 136, Kluwer 1998, ISBN 0-412-84770-1 [contents] - 1997
- Patrizia Asirelli:
View Constraints: An Interpretation of Integrity Constraints for Security. IICIS 1997: 237-252 - François Bry:
Query Answering in Information Systems with Integrity Constraints. IICIS 1997: 113-130 - David Chadwick, Joan Knight, Phil Clipsham:
Information Integrity in End-User Systems. IICIS 1997: 273-292 - Michael Gertz, Udo W. Lipeck:
An Extensible Framework for Repairing Constraint Violations. IICIS 1997: 89-111 - Erik Guldentops:
Establishing an Information Security Strategy. IICIS 1997: 1-21 - Gerhard Knolmayer, Thomas Buchberger:
Maintaining Temporal Integrity of World Wide Web pages. IICIS 1997: 43-63 - Youssef Lahlou:
A Model for Specifying Individual Integrity Constraints on Objects. IICIS 1997: 217-235 - Kyuwoong Lee, Seog Park:
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs. IICIS 1997: 131-151 - William List:
Detecting Data Integrity Failures. IICIS 1997: 341-348 - William List:
The Effects of Time on Integrity in Information Systems. IICIS 1997: 349-358 - William List, W. R. Melville:
Integrity in Information Systems. IICIS 1997: 295-340 - Naftaly H. Minsky:
Towards Continuously Auditable Systems. IICIS 1997: 23-41 - Robert Moeller:
Changing Definitions of Internal Control and Information Systems Integrity. IICIS 1997: 255-272 - A. W. Neisingh:
Control of Information and Communication Technology: An Integrity Problem. IICIS 1997: 253-254 - Amit P. Sheth:
Managing with Less than Absolute Integrity. IICIS 1997: 195-202 - Maria Amélia Pacheco e Silva:
Dynamic Integrity Constraints Definition and Enforcement in Databases: A Classification Framework. IICIS 1997: 65-87 - Leon Strous:
Integrity: Definition, Subdivision, Challenge. IICIS 1997: 187-194 - Matti Tenhunen:
The Integrity of Electronic Evidence. IICIS 1997: 153-186 - Andrew E. Wade:
Integrity: Do you know where your Objects Are? IICIS 1997: 203-215