3. IICIS 1999:
Amsterdam,
The Netherlands
Margaret E. van Biene-Hershey, Leon Strous (Eds.):
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999.
IFIP Conference Proceedings 165 Kluwer 1999, ISBN 0-7923-7821-0
@proceedings{DBLP:conf/tc11-5/1999,
editor = {Margaret E. van Biene-Hershey and
Leon Strous},
title = {Integrity and Internal Control in Information Systems, IFIP TC11
Working Group 11.5, Third Working Conference on Integrity and
Internal Control in Information Systems: Strategic Views on the
Need for Control, Amsterdam, The Netherlands, November 18-19,
1999},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {165},
year = {1999},
isbn = {0-7923-7821-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Fayezul H. Choudhury, Philip Mitchell:
COSO in the Worldbank.
1-10
- Robert Melville, Michael Hafen:
Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center.
11-22
- Vijay V. Mandke, Madhavan K. Nayar:
Implementing Information Integrity Technology - A Feedback Control System Approach.
23-40
- Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards:
Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM).
41-58
- Paul Ammann, Sushil Jajodia:
The Integrity Challenge.
59-70
- Wouter J. Keller, Roel G. J. Rot:
Integrity and Internal Control in a Statistical Environment.
71-84
- Paloma Díaz, Ignacio Aedo, Fivos Panetsos:
Definition of Integrity Policies For Web-based Applications.
85-98
- Patrizia Asirelli, Fabrizio Fabbrini:
Firewall Policies Definition Tools: An Implementation Idea.
99-110
- Martin Stanek, Daniel Olejar:
Integrity Testing in WWW Environment.
111-120
- Piet J. M. Poos:
Complex IT Environments: Ascertaining Information Integrity.
121-146
- Lars Frank:
Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties.
147-158
- Christina Yip Chung, Michael Gertz, Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems.
159-178
- Joan L. Aron, Ronald A. Gove:
Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update.
179-184
Acknowledgement:
The information on this page was contributed by Michael Gertz.
Copyright © Sun Mar 14 23:27:53 2010
by Michael Ley (ley@uni-trier.de)