Abstract is missing.
- Remote Integrity Checking - How to Trust Files Stored on Untrusted ServersYves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane. 1-11 [doi]
- Automated Checking of SAP Security PermisisonsSebastian Höhn, Jan Jürjens. 13-30 [doi]
- A Formal Analysis of a Digital Signature ArchitectureDavid A. Basin, Kunihiko Miyazaki, Kazuo Takaragi. 31-47 [doi]
- Using Parameterized UML to Specify and Compose Access Control ModelsIndrakshi Ray, Na Li, Dae-Kyoo Kim, Robert B. France. 49-65 [doi]
- Enforcing Integrity in Multimedia SurveillanceNaren Kodali, Csilla Farkas, Duminda Wijesekera. 67-81 [doi]
- A Learning-based Approach to Information Release ControlClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia. 83-105 [doi]
- Information Security Governance using ISO 17799 and COBITElmari Pretorius, Basie von Solms. 107-113 [doi]
- Tracing Attacks and Restoring Integrity with LascarAlexandre Aellig, Philippe Oechslin. 115-124 [doi]
- A Secure Multi-Sited Version Control SystemIndrajit Ray, Junxing Zhang. 125-141 [doi]
- Integration of Integrity Constraints in Database FederationsHerman Balsters, Bert O. de Brock. 143-158 [doi]
- Reducing Disruption in Time-Tabled Condition MonitoringBinling Jin, Suzanne M. Embury. 159-176 [doi]
- A Service Oriented System Based Information Flow Model for Damage AssessmentYanjun Zuo, Brajendra Panda. 177-194 [doi]
- An Efficient OODB Model for Ensuring the Integrity of User-Defined ConstraintsBelal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman. 195-208 [doi]
- From Security Culture to Effective E-Security SolutionsSolange Ghernaouti-Helie. 209-218 [doi]
- Consistent Query Answering - Recent Developments and Future DirectionsJan Chomicki. 219-239 [doi]
- Role of Certification in Meeting Organisation Security RequirementsWilliam List. 241-248 [doi]
- Grand Challenges in Data Integrity and Quality: Panel DiscussionBhavani M. Thuraisingham. 249-253 [doi]