Abstract is missing.
- Propagating Integrity Information among Interrelated DatabasesArnon Rosenthal, Edward Sciore. 5-18
- Integrity Constraint Enforcement in a Multidatabase Using Distributed Active RulesL. G. Gomez, Susan Darling Urban. 19-39
- The Constraint Operator of MedLan: Its Efficient Implementation and UsePatrizia Asirelli, Chiara Renso, Franco Turini. 41-55
- Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-AuditorsMargaret E. van Biene-Hershey. 57-74
- TOP: An Example of Complex Application ControlsM. Korver. 75-101
- Algebra for Databases with Explicit Markings of Damaged DataGiovanni Rumolo, Sushil Jajodia. 103-129
- Application of Models from Epidemiology to Metrics for Computer Virus RiskJoan L. Aron, Ronald A. Gove. 131-145
- Integrity Control of Spreadsheets: Organisation & ToolsKamalasen Rajalingham, David Chadwick. 147-168
- Design Basis for Achieving Information Integrity - a Feedback Control System ApproachVijay V. Mandke, Madhavan K. Nayar. 169-190
- Modification of Integrity Constraints Through Knowledge DiscoveryVijayalakshmi Atluri. 191-209
- Managing Data Quality and Integrity in Federated DatabasesMichael Gertz. 211-230
- A Logical Formalization of Integrity Policies for Database Management SystemsFrédéric Cuppens, Claire Saurel. 231-254
- Maintaining Integrity Constraints and Security in real-Time Database SystemsQuazi N. Ahmed, Susan V. Vrbsky. 255-270
- Assurance - What is it?M. D. Abrams, Douglas J. Landoll, Gary Stoneburner. 271-284