The SCEAS System
Navigation Menu

Conferences in DBLP

Integrity and Internal Control in Information Systems (IICIS) (tc11-5)
1998 (conf/tc11-5/1998)

  1. Arnon Rosenthal, Edward Sciore
    Propagating Integrity Information among Interrelated Databases. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:5-18 [Conf]
  2. L. G. Gomez, Susan Darling Urban
    Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:19-39 [Conf]
  3. Patrizia Asirelli, Chiara Renso, Franco Turini
    The Constraint Operator of MedLan: Its Efficient Implementation and Use. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:41-55 [Conf]
  4. Margaret E. van Biene-Hershey
    Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:57-74 [Conf]
  5. M. Korver
    TOP: An Example of Complex Application Controls. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:75-101 [Conf]
  6. Giovanni Rumolo, Sushil Jajodia
    Algebra for Databases with Explicit Markings of Damaged Data. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:103-129 [Conf]
  7. Joan L. Aron, Ronald A. Gove
    Application of Models from Epidemiology to Metrics for Computer Virus Risk. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:131-145 [Conf]
  8. Kamalasen Rajalingham, David Chadwick
    Integrity Control of Spreadsheets: Organisation & Tools. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:147-168 [Conf]
  9. Vijay V. Mandke, Madhavan K. Nayar
    Design Basis for Achieving Information Integrity - a Feedback Control System Approach. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:169-190 [Conf]
  10. Vijayalakshmi Atluri
    Modification of Integrity Constraints Through Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:191-209 [Conf]
  11. Michael Gertz
    Managing Data Quality and Integrity in Federated Databases. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:211-230 [Conf]
  12. Frédéric Cuppens, Claire Saurel
    A Logical Formalization of Integrity Policies for Database Management Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:231-254 [Conf]
  13. Quazi N. Ahmed, Susan V. Vrbsky
    Maintaining Integrity Constraints and Security in real-Time Database Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:255-270 [Conf]
  14. M. D. Abrams, Douglas J. Landoll, Gary Stoneburner
    Assurance - What is it? [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:271-284 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002