Preface |
Acknowledgements |
Refereed Papers / Part 1: |
Concurrent Checking of Global Cross-database Integrity Constraints / Stefan Bottcher1.: |
Increasing the Accuracy of Time-tabled Condition Monitoring / Binling Jin ; Suzanne M. Embury2.: |
Designing High Integrity Systems Using Aspects / Geri Georg ; Robert France ; Indrakshi Ray3.: |
Towards Effect Preservation of Updates with Loops / Steffen Jurk ; Mira Balaban4.: |
Application Controls in a Client/Server Environment / Fred de Koning5.: |
Protecting Java Component Integrity Against Trojan Horse Programs / Marcel Winandy ; Armin B. Cremers ; Hanno Langweg ; Adrian Spalka6.: |
Information Security: A Corporate Governance Issue / Elmarie Kritzinger-von Solms ; Leon A.M. Strous7.: |
Invited Papers / Part 2: |
The Very Brief History of Digital Evidence Standards / Mark M. Pollitt8.: |
Multi-representation: A New Paradigm for Databases / Stefano Spaccapietra ; Christelle Vangenot ; Christine Parent9.: |
The Impact of Web Services on Audit / Cristina Buchholz10.: |
Vendor White Papers / Part 3: |
Integrity Mechanisms in German and International Payment Systems / Detlef Kraus11.: |
Monitoring Mission Critical Data for Integrity and Availability / Michael Gertz ; George Csaba12.: |
Tutorial "The Subversive Spreadsheet" / Part 4: |
Stop that Subversive Spreadsheet! / David Chadwick13.: |
A Typical Model Audit Approach / Grenville J. Croll14.: |
Panel / Part 5: |
Opportunities and Challenges in Tracing Security Breaches / 15.: |
Index of Contributors |
Index of Keywords |
Preface |
Acknowledgements |
Refereed Papers / Part 1: |
Concurrent Checking of Global Cross-database Integrity Constraints / Stefan Bottcher1.: |
Increasing the Accuracy of Time-tabled Condition Monitoring / Binling Jin ; Suzanne M. Embury2.: |
Designing High Integrity Systems Using Aspects / Geri Georg ; Robert France ; Indrakshi Ray3.: |