Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi |
A Formal Analysis of a Digital Signature Architecture. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Elmari Pretorius, Basie von Solms |
Information Security Governance using ISO 17799 and COBIT. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
A Learning-based Approach to Information Release Control. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Indrajit Ray, Junxing Zhang |
A Secure Multi-Sited Version Control System. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | William List |
Role of Certification in Meeting Organisation Security Requirements. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France |
Using Parameterized UML to Specify and Compose Access Control Models. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Michael Gertz 0001, Erik Guldentops, Leon Strous (eds.) |
Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Cristina Buchholz |
The Impact of Web Services on Audit. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Binling Jin, Suzanne M. Embury |
Increasing the Accuracy of Time-tabled Condition Monitoring. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | David Chadwick |
Stop that Subversive Spreadsheet! |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Mark Pollitt |
The Very Brief History of Digital Evidence Standards. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001 |
Opportunities and Challenges in Tracing Security Breaches. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Grenville J. Croll |
A Typical Model Audit Approac. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Steffen Jurk, Mira Balaban |
Towards Effect Preservation of Updates with Loops. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Elmarie Kritzinger-von Solms, Leon Strous |
Information Security: A Corporate Governance Issue. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Stefano Spaccapietra, Christelle Vangenot, Christine Parent |
Multi-representation: A New Paradigm for Databases. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Fred de Koning |
Application Controls in a Client/Server Environment. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Frank Piessens, Bart De Decker, Bart De Win |
Developing secure software. A survey and classification of common software vulnerabilities. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Mike Ward |
Security in electronic payment systems EMV and CEPs. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | BartJan Wattel |
Business process security. Managing the new security challenge with X-Tra Secure. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Bhavani Thuraisingham, Eric Hughes |
Data quality: developments and directions. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Naftaly H. Minsky |
Establishing accounting principles as invariants of financial systems. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Alfred C. E. van Gils |
Implementation of the COBIT-3 maturity model in Royal Philips Electronics. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Leon Strous |
The way forward. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Charles Bain, Donald B. Faatz, Amgad Fayad, Douglas E. Williams |
Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Erik Guldentops |
Governing information technology through COBIT. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
19 | Margaret E. van Biene-Hershey, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999 |
|
1999 |
DBLP BibTeX RDF |
|
19 | Robert Melville, Michael Hafen |
Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
19 | Patrizia Asirelli, Fabrizio Fabbrini |
Firewall Policies Definition Tools: An Implementation Idea. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
19 | Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt |
DEMIDS: A Misuse Detection System for Database Systems. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
19 | Fayezul H. Choudhury, Philip Mitchell |
COSO in the Worldbank. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
19 | Joan L. Aron, Ronald A. Gove |
Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
19 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 |
|
1998 |
DBLP BibTeX RDF |
|
19 | Marshall D. Abrams, Douglas J. Landoll, Gary Stoneburner |
Assurance - What is it? |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Marcel Korver |
TOP: An Example of Complex Application Controls. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Joan L. Aron, Ronald A. Gove |
Application of Models from Epidemiology to Metrics for Computer Virus Risk. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Margaret E. van Biene-Hershey |
Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Giovanni Rumolo, Sushil Jajodia |
Algebra for Databases with Explicit Markings of Damaged Data. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Patrizia Asirelli, Chiara Renso, Franco Turini |
The Constraint Operator of MedLan: Its Efficient Implementation and Use. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
19 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (eds.) |
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 |
|
1997 |
DBLP BibTeX RDF |
|
19 | Naftaly H. Minsky |
Towards Continuously Auditable Systems. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
19 | Erik Guldentops |
Establishing an Information Security Strategy. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001, Udo W. Lipeck |
An Extensible Framework for Repairing Constraint Violations. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
19 | Michael Gertz 0001, Udo W. Lipeck |
Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. |
Data Knowl. Eng. |
1996 |
DBLP DOI BibTeX RDF |
|
19 | Patrizia Asirelli, Paola Inverardi, Giuseppe Plagenza |
Integrity Constraints as Views in Deductice Databases. |
FMLDO |
1996 |
DBLP BibTeX RDF |
|
19 | Suzanne M. Embury |
Coping with Constraint Violation: the Practical Face of Database Integrity. |
FMLDO |
1996 |
DBLP BibTeX RDF |
|
19 | Robert Demolombe, Andrew J. I. Jones, José Carmo |
Towards a Uniform Logical Representation of Different Kinds of Integrity Constraints. |
FMLDO |
1996 |
DBLP BibTeX RDF |
|
19 | Anne Doucet, Stéphane Gançarski, Geneviève Jomier, Sophie Monties |
Integrity Constraints and Versions. |
FMLDO |
1996 |
DBLP BibTeX RDF |
|
19 | Antoon Bosselaers, Bart Preneel (eds.) |
Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 |
|
1995 |
DOI RDF |
|
19 | Hirofumi Katsuno |
Two Classes of Easily Tested Integrity Constraints: Complacent and FD-complacent Integrity Constraints. |
FODO |
1985 |
DBLP BibTeX RDF |
|
19 | Gilles M. E. Lafue |
Semantic Integrity Dependencies and Delayed Integrity Checking. |
VLDB |
1982 |
DBLP BibTeX RDF |
|
15 | Michael Stepp, Beth Simon |
Introductory computing students' conceptions of illegal student-student collaboration. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
academic integrity, cs1, cheating, plagiarism |
15 | Junxia Ma, Jeremy Lee, Mohammad Tehranipoor, Nisar Ahmed, Patrick Girard 0001 |
Pattern grading for testing critical paths considering power supply noise and crosstalk using a layout-aware quality metric. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
pattern grading, crosstalk, signal integrity, power supply noise, path delay test |
15 | C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia |
Dynamic provable data possession. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
authenticated data structures, outsourced storage, proof of retrievability, provable data possession, authentication, skip list, integrity checking |
15 | Guoxing Zhan, Weisong Shi, Hongmei Julia Deng |
SensorTrust: a resilient trust model for WSNs. |
SenSys |
2009 |
DBLP DOI BibTeX RDF |
hierarchical WSNs, trust, data integrity |
15 | Martin Op't Land, Hans Zwitzer, Paul Ensink, Quentin Lebel |
Towards a fast enterprise ontology based method for post merger integration. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
merging IT systems, merging organizations, migration issues, operational integrity, post merger integration, return on modeling effort, enterprise networks, DEMO, enterprise ontology, PMI |
15 | Jens Braband, Rüdiger vom Hövel, Hendrik Schäbe |
Probability of Failure on Demand - The Why and the How. |
SAFECOMP |
2009 |
DBLP DOI BibTeX RDF |
Probability of failure on demand, rate of dangerous failures, safety integrity level |
15 | Yue Li 0013, Chang-Tsun Li |
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
PRNU noise pattern, source device identification, Digital forensics, integrity verification |
15 | Chang-Tsun Li, Yue Li 0013 |
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification |
15 | Giuseppe Pelagatti, Mauro Negri, Alberto Belussi, Sara Migliorini |
From the conceptual design of spatial constraints to their implementation in real systems. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
spatial data validation, spatial integrity constraints, conceptual modeling |
15 | Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao |
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. |
Privacy Enhancing Technologies |
2009 |
DBLP DOI BibTeX RDF |
privacy, verification, integrity, secret sharing, outsource, Aggregate query |
15 | Robert A. Kowalski, Fariba Sadri |
Integrating Logic Programming and Production Systems in Abductive Logic Programming Agents. |
RR |
2009 |
DBLP DOI BibTeX RDF |
Abductive logic programming, agents, Integrity constraints, Production systems |
15 | Leona F. Fass |
An ethnocentric look at the law and technology interface. |
ACM SIGSOFT Softw. Eng. Notes |
2008 |
DBLP DOI BibTeX RDF |
Technology policy, barriers to access, engineering ethics, ethnocentric software engineering, human-web interaction, security, privacy, information integrity, computing environments |
15 | Yunhua Koglin, Danfeng Yao, Elisa Bertino |
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
Security, Distributed systems, Data sharing, Database Management, integrity and protection |
15 | Renzo Angles, Claudio Gutierrez 0001 |
Survey of graph database models. |
ACM Comput. Surv. |
2008 |
DBLP DOI BibTeX RDF |
graph database models, graph integrity constraints, graph query languages, Database systems, graph databases, database models |
15 | Christoph Heller, Josef Schalk, Stefan Schneele, Reinhard Reichel |
Approaching the Limits of FlexRay. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
signal integrity criteria, topology assessment, FlexRay, physical layer, aeronautic |
15 | Yin Hu, Ghaith Hammouri, Berk Sunar |
A fast real-time memory authentication protocol. |
STC |
2008 |
DBLP DOI BibTeX RDF |
fast authentication, memory integrity, universal hash |
15 | Haowen Chan, Adrian Perrig |
Efficient security primitives derived from a secure aggregation algorithm. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation |
15 | Frederic Stumpf, Andreas Fuchs 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Improving the scalability of platform attestation. |
STC |
2008 |
DBLP DOI BibTeX RDF |
attestation protocols, integrity reporting, performance, scalability, trusted computing, remote attestation |
15 | Richard P. Gabriel |
Designed as designer. |
OOPSLA |
2008 |
DBLP DOI BibTeX RDF |
conceptual integrity, design |
15 | Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili |
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
Context-Awareness, Integrity, Confidentiality, Mandatory Access Control |
15 | Cédric Fournet, Tamara Rezk |
Cryptographically sound implementations for typed information-flow security. |
POPL |
2008 |
DBLP DOI BibTeX RDF |
probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow |
15 | Kazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov |
Secure aggregation in a publish-subscribe system. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
integrity, aggregation, data privacy, publish-subscribe system |
15 | Ding Chen, Chee Yong Chan |
Minimization of tree pattern queries with constraints. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
query minimization, tree pattern queries, simulation, xpath, xml, integrity constraints, chase |
15 | Moritoshi Yasunaga, Yoshiki Yamaguchi, Hiroshi Nakayama, Ikuo Yoshihara, Naoki Koizumi, Jung Hwan Kim |
The Segmental-Transmission-Line: Its Design and Prototype Evaluation. |
ICES |
2008 |
DBLP DOI BibTeX RDF |
Evolutionary Hardware Design, Signal Integrity, Transmission Line, Printed Circuit Board |
15 | Toshikazu Uemura, Tadashi Dohi |
Optimizing Security Measures in an Intrusion Tolerant Database System. |
ISAS |
2008 |
DBLP DOI BibTeX RDF |
ITDB, dependable and secure service, rewarding availability, optimization, survivability, system integrity, semi-Markov models |
15 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
15 | Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang 0001 |
Trustworthy and personalized computing on public kiosks. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
kiosk computing, mobility, virtualization, personalized computing, trusted platform module, integrity verification |
15 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
15 | Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang |
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking |
15 | Esmiralda Moradian |
Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
integrity, monitoring, intelligent agents, availability, Information security, confidentiality, meta-agents |
15 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
15 | Zhen Mu |
Power Delivery System: Sufficiency, Efficiency, and Stability. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
Power Integrity (PI), power delivery system (PDS), Chip-Package-Board Co-design |
15 | James D'Arcy Walsh, Francis Bordeleau, Bran Selic |
Domain analysis of dynamic system reconfiguration. |
Softw. Syst. Model. |
2007 |
DBLP DOI BibTeX RDF |
based systems, driven development, Model-, UML, Component, Software evolution, Dynamic reconfiguration, System integrity, Feature modeling, Alloy |
15 | Karim Arabi, Resve A. Saleh, Xiongfei Meng |
Power Supply Noise in SoCs: Metrics, Management, and Measurement. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
metrics, DFT, power supply noise, deep-submicron, production test, power integrity |
15 | Jon Heggland |
Foreign Superkeys and Constant References. |
IDEAS |
2007 |
DBLP DOI BibTeX RDF |
Relational theory, entity subclassing, foreign keys, integrity constraints |
15 | Bogdan Cautis, Serge Abiteboul, Tova Milo |
Reasoning about XML update constraints. |
PODS |
2007 |
DBLP DOI BibTeX RDF |
update constraints, XML, data integrity, semi-structured data, implication |
15 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
15 | Subhasish Mitra, Pia N. Sanda, Norbert Seifert |
Soft Errors: Technology Trends, System Effects, and Protection Techniques. |
IOLTS |
2007 |
DBLP DOI BibTeX RDF |
Memory soft errors, Logic soft errors, timing derating, logic derating, architectural derating, Built-In Soft Error Resilience, reliability, data integrity, availability, Error Correcting Codes, error detection, recovery, Soft errors, FITs, radiation hardening |
15 | Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim 0001 |
Efficient an Implementation Method Research of a Smart Card Atomic Operation. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
Card Operating System (COS), Data integrity, Atomic operation |
15 | Frédéric Gervais, Marc Frappier, Régine Laleau |
Refinement of eb3 Process Patterns into B Specifications. |
B |
2007 |
DBLP DOI BibTeX RDF |
data integrity constraints, eb3, process expressions, Information systems, refinement |
15 | Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Chun, John Kubiatowicz |
Antiquity: exploiting a secure log for wide-area distributed storage. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
archival storage systems, data durability, data integrity, distributed storage system, wide-area |
15 | Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen |
Adding dynamic reconfiguration support to JBoss AOP. |
MAI |
2007 |
DBLP DOI BibTeX RDF |
aspect-oriented middleware, dynamic distributed aspect weaving, dynamic reconfiguration of distributed systems, global state consistency, structural integrity |
15 | Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady |
Enhancing Security and Privacy in Traffic-Monitoring Systems. |
IEEE Pervasive Comput. |
2006 |
DBLP DOI BibTeX RDF |
traffic monitoring systems, security, clustering, privacy, data integrity |
15 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
15 | Jordi Cabot, Ernest Teniente |
Transforming OCL constraints: a context change approach. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
context change, transformation, OCL, integrity constraint |
15 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
15 | Chen-Wei Liu, Yao-Wen Chang |
Floorplan and power/ground network co-synthesis for fast design convergence. |
ISPD |
2006 |
DBLP DOI BibTeX RDF |
power/ground analysis, simulated annealing, floorplanning, IR drop, power integrity |
15 | Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Kleptographic Attacks on E-Voting Schemes. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography |
15 | Marco Brambilla 0001, Jordi Cabot |
Constraint tuning and management for web applications. |
ICWE |
2006 |
DBLP DOI BibTeX RDF |
web application, integrity constraints, tuning |