2. IICIS 1998:
Warrenton,
Virginia,
USA
Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (Eds.):
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998.
IFIP Conference Proceedings 136 Kluwer 1998, ISBN 0-412-84770-1
@proceedings{DBLP:conf/tc11-5/1998,
editor = {Sushil Jajodia and
William List and
Graeme W. McGregor and
Leon Strous},
title = {Integrity and Internal Control in Information Systems, IFIP TC11
Working Group 11.5, Second Working Conference on Integrity and
Internal Control in Information Systems: Bridging Business Requirements
and Research Results, Warrenton, Virginia, USA, November 19-20,
1998},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {136},
year = {1998},
isbn = {0-412-84770-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Arnon Rosenthal, Edward Sciore:
Propagating Integrity Information among Interrelated Databases.
5-18
- L. G. Gomez, Susan Darling Urban:
Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules.
19-39
- Patrizia Asirelli, Chiara Renso, Franco Turini:
The Constraint Operator of MedLan: Its Efficient Implementation and Use.
41-55
- Margaret E. van Biene-Hershey:
Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors.
57-74
- M. Korver:
TOP: An Example of Complex Application Controls.
75-101
- Giovanni Rumolo, Sushil Jajodia:
Algebra for Databases with Explicit Markings of Damaged Data.
103-129
- Joan L. Aron, Ronald A. Gove:
Application of Models from Epidemiology to Metrics for Computer Virus Risk.
131-145
- Kamalasen Rajalingham, David Chadwick:
Integrity Control of Spreadsheets: Organisation & Tools.
147-168
- Vijay V. Mandke, Madhavan K. Nayar:
Design Basis for Achieving Information Integrity - a Feedback Control System Approach.
169-190
- Vijayalakshmi Atluri:
Modification of Integrity Constraints Through Knowledge Discovery.
191-209
- Michael Gertz:
Managing Data Quality and Integrity in Federated Databases.
211-230
- Frédéric Cuppens, Claire Saurel:
A Logical Formalization of Integrity Policies for Database Management Systems.
231-254
- Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining Integrity Constraints and Security in real-Time Database Systems.
255-270
- M. D. Abrams, Douglas J. Landoll, Gary Stoneburner:
Assurance - What is it?
271-284
Copyright © Sun Mar 14 23:27:52 2010
by Michael Ley (ley@uni-trier.de)