


default search action
Integrity and Internal Control in Information Systems 2003: Lausanne, Switzerland
- Sushil Jajodia, Leon Strous:

Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland. IFIP 140, Springer 2004, ISBN 978-1-4020-7900-9 - Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane:

Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. 1-11 - Sebastian Höhn, Jan Jürjens:

Automated Checking of SAP Security Permisisons. 13-30 - David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi:

A Formal Analysis of a Digital Signature Architecture. 31-47 - Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France:

Using Parameterized UML to Specify and Compose Access Control Models. 49-65 - Naren Kodali, Csilla Farkas, Duminda Wijesekera:

Enforcing Integrity in Multimedia Surveillance. 67-81 - Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:

A Learning-based Approach to Information Release Control. 83-105 - Elmari Pretorius, Basie von Solms:

Information Security Governance using ISO 17799 and COBIT. 107-113 - Alexandre Aellig, Philippe Oechslin:

Tracing Attacks and Restoring Integrity with Lascar. 115-124 - Indrajit Ray, Junxing Zhang:

A Secure Multi-Sited Version Control System. 125-141 - Herman Balsters, Bert O. de Brock:

Integration of Integrity Constraints in Database Federations. 143-158 - Binling Jin, Suzanne M. Embury:

Reducing Disruption in Time-Tabled Condition Monitoring. 159-176 - Yanjun Zuo, Brajendra Panda:

A Service Oriented System Based Information Flow Model for Damage Assessment. 177-194 - Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman:

An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. 195-208 - Solange Ghernaouti-Helie:

From Security Culture to Effective E-Security Solutions. 209-218 - Jan Chomicki:

Consistent Query Answering - Recent Developments and Future Directions. 219-239 - William List:

Role of Certification in Meeting Organisation Security Requirements. 241-248 - Bhavani Thuraisingham:

Grand Challenges in Data Integrity and Quality: Panel Discussion. 249-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














