The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IICIS"( http://dblp.L3S.de/Venues/IICIS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/tc11-5

Publication years (Num. hits)
1997 (19) 1998-1999 (27) 2001-2002 (28) 2003 (18) 2004 (25) 2006 (1)
Publication types (Num. hits)
inproceedings(114) proceedings(4)
Venues (Conferences, Journals, ...)
IICIS(118)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 118 publication records. Showing 118 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Paul Dowland 0001, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang (eds.) Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA] Search on Bibsonomy IICIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Malcolm Robert Pattinson, Grantley Anderson Risk Communication, Risk Perception and Information Security. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Corey Hirsch Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Janine L. Spears A Holistic Risk Analysis Method for Identifying Information Security Risks. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Vassilis Dimopoulos, Steven Furnell A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shaun Posthumus, Rossouw von Solms A Responsibility Framework for Information Security. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rafae Bhatti, Elisa Bertino, Arif Ghafoor A Policy Framework for Access Management in Federated Information Sharing. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chao Yao, William H. Winsborough, Sushil Jajodia A Hierarchical Release Control Policy Framework. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jean-Noël Ezingeard, David William Birchall Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos How Much Should We Pay for Security? (Invited Paper). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Peng Liu 0005 Attack Aware Integrity Control in Databases (Invited Abstract). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Omar Zakaria Employee Security Perception in Cultivating Information Security Culture. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1James R. Conrad, Paul W. Oman, Carol Taylor Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Oleksiy Mazhelis, Seppo Puuronen Characteristics and Measures for Mobile-Masquerader Detection. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Gurvirender Tejay 0001, Gurpreet Dhillon, Amita Goyal Chin Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Leon Strous (eds.) Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Louise Yngström Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Andrzej Bialas A UML Approach in the ISMS Implementation. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yanjun Zuo, Brajendra Panda A Trust-Based Model for Information Integrity in Open Systems. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Paul Thompson Semantic Information Infrastructure Protection (Invited Abstract). Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Arnon Rosenthal Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rahul Rastogi, Rossouw von Solms Information Security Governance - A Re-Definition. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Reijo Savola, Juhani Anttila, Anni Sademies, Jorma Kajava, Jarkko Holappa Measurement of Information Security in Processes and Products. Search on Bibsonomy IICIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jan Chomicki Consistent Query Answering - Recent Developments and Future Directions. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Solange Ghernaouti-Helie From Security Culture to Effective E-Security Solutions. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Binling Jin, Suzanne M. Embury Reducing Disruption in Time-Tabled Condition Monitoring. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sebastian Höhn, Jan Jürjens Automated Checking of SAP Security Permisisons. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham Grand Challenges in Data Integrity and Quality: Panel Discussion. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yanjun Zuo, Brajendra Panda A Service Oriented System Based Information Flow Model for Damage Assessment. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Naren Kodali, Csilla Farkas, Duminda Wijesekera Enforcing Integrity in Multimedia Surveillance. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi A Formal Analysis of a Digital Signature Architecture. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Elmari Pretorius, Basie von Solms Information Security Governance using ISO 17799 and COBIT. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia A Learning-based Approach to Information Release Control. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Alexandre Aellig, Philippe Oechslin Tracing Attacks and Restoring Integrity with Lascar. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Junxing Zhang A Secure Multi-Sited Version Control System. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Herman Balsters, Bert O. de Brock Integration of Integrity Constraints in Database Federations. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1William List Role of Certification in Meeting Organisation Security Requirements. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Gertz 0001 (eds.) Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  BibTeX  RDF
1Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France Using Parameterized UML to Specify and Compose Access Control Models. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Gertz 0001, George Csaba Monitoring Mission Critical Data for Integrity and Availability. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Cristina Buchholz The Impact of Web Services on Audit. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Geri Georg, Robert B. France, Indrakshi Ray Designing High Integrity Systems Using Aspects. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Binling Jin, Suzanne M. Embury Increasing the Accuracy of Time-tabled Condition Monitoring. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1David Chadwick Stop that Subversive Spreadsheet! Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Michael Gertz 0001, Erik Guldentops, Leon Strous (eds.) Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Mark Pollitt The Very Brief History of Digital Evidence Standards. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Detlef Kraus Integrity Mechanisms in German and International Payment Systems. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Michael Gertz 0001 Opportunities and Challenges in Tracing Security Breaches. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Stefan Böttcher Concurrent Checking of Global Cross-database Integrity Constraints. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Grenville J. Croll A Typical Model Audit Approac. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Steffen Jurk, Mira Balaban Towards Effect Preservation of Updates with Loops. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Elmarie Kritzinger-von Solms, Leon Strous Information Security: A Corporate Governance Issue. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Stefano Spaccapietra, Christelle Vangenot, Christine Parent Multi-representation: A New Paradigm for Databases. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka Protecting Java Component Integrity Against Trojan Horse Programs. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Fred de Koning Application Controls in a Client/Server Environment. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
1Frank Piessens, Bart De Decker, Bart De Win Developing secure software. A survey and classification of common software vulnerabilities. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Mike Ward Security in electronic payment systems EMV and CEPs. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1BartJan Wattel Business process security. Managing the new security challenge with X-Tra Secure. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Bhavani Thuraisingham, Eric Hughes Data quality: developments and directions. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Madhavan K. Nayar The information integrity imperative. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Naftaly H. Minsky Establishing accounting principles as invariants of financial systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Jim Jones Integrity and internal control in modern banking systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Cynthia E. Irvine, Timothy E. Levin A cautionary note regarding the data integrity capacity of certain secure systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Alfred C. E. van Gils Implementation of the COBIT-3 maturity model in Royal Philips Electronics. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Leon Strous The way forward. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Charles Bain, Donald B. Faatz, Amgad Fayad, Douglas E. Williams Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Erik Guldentops Governing information technology through COBIT. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
1Paul Ammann, Sushil Jajodia The Integrity Challenge. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos Definition of Integrity Policies For Web-based Applications. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Robert Melville, Michael Hafen Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Patrizia Asirelli, Fabrizio Fabbrini Firewall Policies Definition Tools: An Implementation Idea. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Piet J. M. Poos Complex IT Environments: Ascertaining Information Integrity. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt DEMIDS: A Misuse Detection System for Database Systems. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Wouter J. Keller, Roel G. J. Rot Integrity and Internal Control in a Statistical Environment. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Vijay V. Mandke, Madhavan K. Nayar Implementing Information Integrity Technology - A Feedback Control System Approach. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Fayezul H. Choudhury, Philip Mitchell COSO in the Worldbank. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Joan L. Aron, Ronald A. Gove Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Martin Stanek, Daniel Olejár Integrity Testing in WWW Environment. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Lars Frank Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
1Marshall D. Abrams, Douglas J. Landoll, Gary Stoneburner Assurance - What is it? Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Marcel Korver TOP: An Example of Complex Application Controls. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Arnon Rosenthal, Edward Sciore Propagating Integrity Information among Interrelated Databases. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Joan L. Aron, Ronald A. Gove Application of Models from Epidemiology to Metrics for Computer Virus Risk. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Vijayalakshmi Atluri Modification of Integrity Constraints Through Knowledge Discovery. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1L. G. Gomez, Susan Darling Urban Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Vijay V. Mandke, Madhavan K. Nayar Design Basis for Achieving Information Integrity - a Feedback Control System Approach. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Quazi N. Ahmed, Susan V. Vrbsky Maintaining Integrity Constraints and Security in real-Time Database Systems. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Frédéric Cuppens, Claire Saurel A Logical Formalization of Integrity Policies for Database Management Systems. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Margaret E. van Biene-Hershey Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Michael Gertz 0001 Managing Data Quality and Integrity in Federated Databases. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Giovanni Rumolo, Sushil Jajodia Algebra for Databases with Explicit Markings of Damaged Data. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Kamalasen Rajalingham, David Chadwick Integrity Control of Spreadsheets: Organisation & Tools. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Patrizia Asirelli, Chiara Renso, Franco Turini The Constraint Operator of MedLan: Its Efficient Implementation and Use. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
1Andrew E. Wade Integrity: Do you know where your Objects Are? Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 118 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license