|
Conferences in DBLP
- Stefan Böttcher
Concurrent Checking of Global Cross-database Integrity Constraints. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:3-19 [Conf]
- Binling Jin, Suzanne M. Embury
Increasing the Accuracy of Time-tabled Condition Monitoring. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:21-35 [Conf]
- Geri Georg, Robert B. France, Indrakshi Ray
Designing High Integrity Systems Using Aspects. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:37-57 [Conf]
- Steffen Jurk, Mira Balaban
Towards Effect Preservation of Updates with Loops. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:59-75 [Conf]
- Fred de Koning
Application Controls in a Client/Server Environment. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:77-97 [Conf]
- Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka
Protecting Java Component Integrity Against Trojan Horse Programs. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:99-113 [Conf]
- E. Kritzinger-von Solms, Leon Strous
Information Security: A Corporate Governance Issue. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:115-133 [Conf]
- Mark Pollitt
The Very Brief History of Digital Evidence Standards. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:135-143 [Conf]
- Stefano Spaccapietra, Christelle Vangenot, Christine Parent
Multi-representation: A New Paradigm for Databases. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:143-149 [Conf]
- Cristina Buchholz
The Impact of Web Services on Audit. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:151-172 [Conf]
- Detlef Kraus
Integrity Mechanisms in German and International Payment Systems. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:175-187 [Conf]
- Michael Gertz, George Csaba
Monitoring Mission Critical Data for Integrity and Availability. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:189-201 [Conf]
- David Chadwick
Stop that Subversive Spreadsheet! [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:205-211 [Conf]
- Grenville J. Croll
A Typical Model Audit Approac. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:213-219 [Conf]
- Michael Gertz
Opportunities and Challenges in Tracing Security Breaches. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:223-226 [Conf]
|