The SCEAS System
Navigation Menu

Conferences in DBLP

Integrity and Internal Control in Information Systems (IICIS) (tc11-5)
2002 (conf/tc11-5/2002)

  1. Stefan Böttcher
    Concurrent Checking of Global Cross-database Integrity Constraints. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:3-19 [Conf]
  2. Binling Jin, Suzanne M. Embury
    Increasing the Accuracy of Time-tabled Condition Monitoring. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:21-35 [Conf]
  3. Geri Georg, Robert B. France, Indrakshi Ray
    Designing High Integrity Systems Using Aspects. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:37-57 [Conf]
  4. Steffen Jurk, Mira Balaban
    Towards Effect Preservation of Updates with Loops. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:59-75 [Conf]
  5. Fred de Koning
    Application Controls in a Client/Server Environment. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:77-97 [Conf]
  6. Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka
    Protecting Java Component Integrity Against Trojan Horse Programs. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:99-113 [Conf]
  7. E. Kritzinger-von Solms, Leon Strous
    Information Security: A Corporate Governance Issue. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:115-133 [Conf]
  8. Mark Pollitt
    The Very Brief History of Digital Evidence Standards. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:135-143 [Conf]
  9. Stefano Spaccapietra, Christelle Vangenot, Christine Parent
    Multi-representation: A New Paradigm for Databases. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:143-149 [Conf]
  10. Cristina Buchholz
    The Impact of Web Services on Audit. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:151-172 [Conf]
  11. Detlef Kraus
    Integrity Mechanisms in German and International Payment Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:175-187 [Conf]
  12. Michael Gertz, George Csaba
    Monitoring Mission Critical Data for Integrity and Availability. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:189-201 [Conf]
  13. David Chadwick
    Stop that Subversive Spreadsheet! [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:205-211 [Conf]
  14. Grenville J. Croll
    A Typical Model Audit Approac. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:213-219 [Conf]
  15. Michael Gertz
    Opportunities and Challenges in Tracing Security Breaches. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:223-226 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002