The SCEAS System
Navigation Menu

Conferences in DBLP

Integrity and Internal Control in Information Systems (IICIS) (tc11-5)
1999 (conf/tc11-5/1999)

  1. Fayezul H. Choudhury, Philip Mitchell
    COSO in the Worldbank. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:1-10 [Conf]
  2. Robert Melville, Michael Hafen
    Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:11-22 [Conf]
  3. Vijay V. Mandke, Madhavan K. Nayar
    Implementing Information Integrity Technology - A Feedback Control System Approach. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:23-40 [Conf]
  4. Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards
    Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:41-58 [Conf]
  5. Paul Ammann, Sushil Jajodia
    The Integrity Challenge. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:59-70 [Conf]
  6. Wouter J. Keller, Roel G. J. Rot
    Integrity and Internal Control in a Statistical Environment. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:71-84 [Conf]
  7. Paloma Díaz, Ignacio Aedo, Fivos Panetsos
    Definition of Integrity Policies For Web-based Applications. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:85-98 [Conf]
  8. Patrizia Asirelli, Fabrizio Fabbrini
    Firewall Policies Definition Tools: An Implementation Idea. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:99-110 [Conf]
  9. Martin Stanek, Daniel Olejar
    Integrity Testing in WWW Environment. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:111-120 [Conf]
  10. Piet J. M. Poos
    Complex IT Environments: Ascertaining Information Integrity. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:121-146 [Conf]
  11. Lars Frank
    Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:147-158 [Conf]
  12. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    DEMIDS: A Misuse Detection System for Database Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:159-178 [Conf]
  13. Joan L. Aron, Ronald A. Gove
    Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:179-184 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002