This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are estab
Integrity and Internal Control in Information Systems VI
β Scribed by Sushil Jajodia, Graeme W. McGregor, William List, Leon A.M. Strous
- Publisher
- Springer
- Year
- 1997
- Tongue
- English
- Leaves
- 268
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes.Integrity and Internal Control in Information Systems VI represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Sixth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Lausanne, Switzerland in November 2003. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and IT-auditing.
β¦ Table of Contents
Team DDU......Page 1
CONTENTS......Page 6
Preface......Page 8
Acknowledgements......Page 10
1. Remote Integrity Checking......Page 12
2. Automated Checking of SAP Security Permissions......Page 24
3. A Formal Analysis of a Digital Signature Architecture......Page 42
4. Using Parameterized UML to Specify and Compose Access Control Models......Page 60
5. Enforcing Integrity in Multimedia Surveillance......Page 78
6. A Learning-based Approach to Information Release Control......Page 94
7. Information Security Governance using ISO 17799 and COBIT......Page 118
8. Tracing Attacks and Restoring Integrity with LASCAR......Page 126
9. A Secure Multi-sited Version Control System......Page 136
10. Integration of Integrity Constraints in Database Federations......Page 154
11. Reducing Disruption in Time-Tabled Condition Monitoring......Page 170
12. A Service Oriented System Based Information Flow Model for Damage Assessment......Page 188
13. An Efficient OODB Model for Ensuring the Integrity of User-defined Constraints......Page 206
14. From Security Culture to Effective E-security Solutions......Page 220
15. Consistent Query Answering: Recent Developments and Future Directions......Page 230
16. Role of Certification in Meeting Organisation Security Requirements......Page 252
17. Grand Challenges in Data Integrity and Quality......Page 260
Index of contributors......Page 266
Index of keywords......Page 268
π SIMILAR VOLUMES
This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are estab
<p>The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions: what prec
<p>Dear readers, Although it is well-known that confidentiality, integrity and availability are highΒ level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has
<p>IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the I
<p>This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship betw