Abstract is missing.
- Concurrent Checking of Global Cross-database Integrity ConstraintsStefan Böttcher. 3-19
- Increasing the Accuracy of Time-tabled Condition MonitoringBinling Jin, Suzanne M. Embury. 21-35
- Designing High Integrity Systems Using AspectsGeri Georg, Robert B. France, Indrakshi Ray. 37-57
- Towards Effect Preservation of Updates with LoopsSteffen Jurk, Mira Balaban. 59-75
- Application Controls in a Client/Server EnvironmentFred de Koning. 77-97
- Protecting Java Component Integrity Against Trojan Horse ProgramsMarcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka. 99-113
- Information Security: A Corporate Governance IssueE. Kritzinger-von Solms, Leon Strous. 115-133
- The Very Brief History of Digital Evidence StandardsMark Pollitt. 135-143
- Multi-representation: A New Paradigm for DatabasesStefano Spaccapietra, Christelle Vangenot, Christine Parent. 143-149
- The Impact of Web Services on AuditCristina Buchholz. 151-172
- Integrity Mechanisms in German and International Payment SystemsDetlef Kraus. 175-187
- Monitoring Mission Critical Data for Integrity and AvailabilityMichael Gertz, George Csaba. 189-201
- Stop that Subversive Spreadsheet!David Chadwick. 205-211
- A Typical Model Audit ApproacGrenville J. Croll. 213-219
- Opportunities and Challenges in Tracing Security BreachesMichael Gertz. 223-226