Sign in
IICIS
1997
2000
2003
2006
1997
2006
Keyphrases
Publications
volume 193, 2006
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]
IICIS
193 (2006)
2004
Rafae Bhatti
,
Elisa Bertino
,
Arif Ghafoor
A Policy Framework for Access Management in Federated Information Sharing.
IICIS
(2004)
Sokratis K. Katsikas
,
Athanasios N. Yannacopoulos
,
Stefanos Gritzalis
,
Costas Lambrinoudakis
,
Petros Hatzopoulos
How Much Should We Pay for Security? (Invited Paper).
IICIS
(2004)
Yanjun Zuo
,
Brajendra Panda
A Trust-Based Model for Information Integrity in Open Systems.
IICIS
(2004)
Peng Liu
Attack Aware Integrity Control in Databases (Invited Abstract).
IICIS
(2004)
Reijo Savola
,
Juhani Anttila
,
Anni Sademies
,
Jorma Kajava
,
Jarkko Holappa
Measurement of Information Security in Processes and Products.
IICIS
(2004)
Andrzej Bialas
A UML Approach in the ISMS Implementation.
IICIS
(2004)
Oleksiy Mazhelis
,
Seppo Puuronen
Characteristics and Measures for Mobile-Masquerader Detection.
IICIS
(2004)
Arnon Rosenthal
Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda.
IICIS
(2004)
Omar Zakaria
Employee Security Perception in Cultivating Information Security Culture.
IICIS
(2004)
Chao Yao
,
William H. Winsborough
,
Sushil Jajodia
A Hierarchical Release Control Policy Framework.
IICIS
(2004)
Janine L. Spears
A Holistic Risk Analysis Method for Identifying Information Security Risks.
IICIS
(2004)
Rahul Rastogi
,
Rossouw von Solms
Information Security Governance - A Re-Definition.
IICIS
(2004)
Csilla Farkas
,
Vaibhav Gowadia
,
Amit Jain
,
D. Roy
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).
IICIS
(2004)
James R. Conrad
,
Paul W. Oman
,
Carol Taylor
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.
IICIS
(2004)
Shaun Posthumus
,
Rossouw von Solms
A Responsibility Framework for Information Security.
IICIS
(2004)
Corey Hirsch
Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems.
IICIS
(2004)
Jean-Noël Ezingeard
,
David William Birchall
Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002.
IICIS
(2004)
Ravi Mukkamala
,
Vijayalakshmi Atluri
,
Janice Warner
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.
IICIS
(2004)
Jabiri Kuwe Bakari
,
Christer Magnusson
,
Charles N. Tarimo
,
Louise Yngström
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.
IICIS
(2004)
Vassilis Dimopoulos
,
Steven Furnell
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.
IICIS
(2004)
Gurvirender Tejay
,
Gurpreet Dhillon
,
Amita Goyal Chin
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).
IICIS
(2004)
Louise Yngström
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).
IICIS
(2004)
Paul Thompson
Semantic Information Infrastructure Protection (Invited Abstract).
IICIS
(2004)
Malcolm Robert Pattinson
,
Grantley Anderson
Risk Communication, Risk Perception and Information Security.
IICIS
(2004)
volume 140, 2004
Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland
IICIS
140 (2004)
2003
Elmari Pretorius
,
Basie von Solms
Information Security Governance using ISO 17799 and COBIT.
IICIS
(2003)
Claudio Bettini
,
Xiaoyang Sean Wang
,
Sushil Jajodia
A Learning-based Approach to Information Release Control.
IICIS
(2003)
Jan Chomicki
Consistent Query Answering - Recent Developments and Future Directions.
IICIS
(2003)
Sebastian Höhn
,
Jan Jürjens
Automated Checking of SAP Security Permisisons.
IICIS
(2003)
Bhavani M. Thuraisingham
Grand Challenges in Data Integrity and Quality: Panel Discussion.
IICIS
(2003)
Binling Jin
,
Suzanne M. Embury
Reducing Disruption in Time-Tabled Condition Monitoring.
IICIS
(2003)
Belal Zaqaibeh
,
Hamidah Ibrahim
,
Ali Mamat
,
Md Nasir Sulaiman
An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints.
IICIS
(2003)
David A. Basin
,
Kunihiko Miyazaki
,
Kazuo Takaragi
A Formal Analysis of a Digital Signature Architecture.
IICIS
(2003)
Naren Kodali
,
Csilla Farkas
,
Duminda Wijesekera
Enforcing Integrity in Multimedia Surveillance.
IICIS
(2003)
Herman Balsters
,
Bert O. de Brock
Integration of Integrity Constraints in Database Federations.
IICIS
(2003)
Indrajit Ray
,
Junxing Zhang
A Secure Multi-Sited Version Control System.
IICIS
(2003)
Indrakshi Ray
,
Na Li
,
Dae-Kyoo Kim
,
Robert B. France
Using Parameterized UML to Specify and Compose Access Control Models.
IICIS
(2003)
Yanjun Zuo
,
Brajendra Panda
A Service Oriented System Based Information Flow Model for Damage Assessment.
IICIS
(2003)
William List
Role of Certification in Meeting Organisation Security Requirements.
IICIS
(2003)
Solange Ghernaouti-Helie
From Security Culture to Effective E-Security Solutions.
IICIS
(2003)
Alexandre Aellig
,
Philippe Oechslin
Tracing Attacks and Restoring Integrity with Lascar.
IICIS
(2003)
Yves Deswarte
,
Jean-Jacques Quisquater
,
Ayda Saïdane
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers.
IICIS
(2003)
volume 251, 2003
Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany
IICIS
251 (2003)
2002
Michael Gertz
Opportunities and Challenges in Tracing Security Breaches.
IICIS
(2002)
Michael Gertz
,
George Csaba
Monitoring Mission Critical Data for Integrity and Availability.
IICIS
(2002)
Cristina Buchholz
The Impact of Web Services on Audit.
IICIS
(2002)
Geri Georg
,
Robert B. France
,
Indrakshi Ray
Designing High Integrity Systems Using Aspects.
IICIS
(2002)
Detlef Kraus
Integrity Mechanisms in German and International Payment Systems.
IICIS
(2002)
volume 211, 2002
Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium
IICIS
211 (2002)