Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information ... (IICIS) November 11-12, 2002, Bonn, Germany - Softcover

 
9781475755343: Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information ... (IICIS) November 11-12, 2002, Bonn, Germany

Synopsis

Preface. Acknowledgements. Part One: Refereed Papers. 1. Concurrent Checking of Global Cross-database Integrity Constraints; S. Böttcher. 2. Increasing the Accuracy of Time-tabled Condition Monitoring; Binling Jin, S.M. Embury. 3. Designing High Integrity Systems Using Aspects; G. Georg, R. France, I. Ray. 4. Towards Effect Preservation of Updates with Loops; S. Jurk, M. Balaban. 5. Application Controls in a Client/Server Environment; F. de Koning. 6. Protecting Java Component Integrity Against Trojan Horse Programs; M. Winandy, A.B. Cremers, H. Langweg, A. Spalka. 7. Information Security: A Corporate Governance Issue; E. Kritzinger-von Solms, L.A.M. Strous. Part Two: Invited Papers. 8. The Very Brief History of Digital Evidence Standards; M.M. Pollitt. 9. Multi-representation: A New Paradigm for Databases; S. Spaccapietra, C. Vangenot, C. Parent. 10. The Impact of Web Services on Audit; C. Buchholz. Part Three: Vendor White Papers. 11. Integrity Mechanisms in German and International Payment Systems; D. Kraus. 12. Monitoring Mission Critical Data for Integrity and Availability; M. Gertz, G. Csaba. Part Four: Tutorial 'The Subversive Spreadsheet'. 13. Stop that Subversive Spreadsheet! D. Chadwick. 14. A Typical Model Audit Approach; G.J. Croll. Part Five. Panel. 15. Opportunities and Challenges in Tracing Security Breaches; M. Gertz. Index of Contributors. Index of Keywords.

"synopsis" may belong to another edition of this title.