Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will…mehr
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology
Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA
Inhaltsangabe
One: IFIP TC-11 Working Group 11. 5: First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in information systems.- 1 Establishing an information security strategy.- 2 Towards continuously auditable systems.- 3 Maintaining temporal integrity of World Wide Web pages.- 4 Dynamic integrity constraints definition and enforcement in databases: a classification framework.- 5 An extensible framework for repairing constraint violations.- 6 Query answering in information systems with integrity constraints.- 7 Optimistic concurrency control for maintaining the global integrity constraint in MDBSs.- 8 The integrity of electronic evidence.- 9 Integrity: definition, subdivision, challenge.- 10 Managing with less than absolute integrity.- 11 Integrity: do you know where your objects are?.- 12 A model for specifying individual integrity constraints on objects.- 13 View constraints: an interpretation of integrity constraints for security.- 14 Control of information and communication technology: an integrity problem. Views, perspectives, education and evaluation.- 15 Changing definitions of internal control and information systems integrity.- 16 Information integrity in end-user systems.- Two Basic papers for the current activities of IFIP TC-11 Working Group 11.5.- 17 Integrity in information systems.- 18 Detecting data integrity failures.- 19 The effects of time on integrity in information systems.- Three General Information.- Index of contributors.- Keyword index.
One: IFIP TC-11 Working Group 11. 5: First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in information systems.- 1 Establishing an information security strategy.- 2 Towards continuously auditable systems.- 3 Maintaining temporal integrity of World Wide Web pages.- 4 Dynamic integrity constraints definition and enforcement in databases: a classification framework.- 5 An extensible framework for repairing constraint violations.- 6 Query answering in information systems with integrity constraints.- 7 Optimistic concurrency control for maintaining the global integrity constraint in MDBSs.- 8 The integrity of electronic evidence.- 9 Integrity: definition, subdivision, challenge.- 10 Managing with less than absolute integrity.- 11 Integrity: do you know where your objects are?.- 12 A model for specifying individual integrity constraints on objects.- 13 View constraints: an interpretation of integrity constraints for security.- 14 Control of information and communication technology: an integrity problem. Views, perspectives, education and evaluation.- 15 Changing definitions of internal control and information systems integrity.- 16 Information integrity in end-user systems.- Two Basic papers for the current activities of IFIP TC-11 Working Group 11.5.- 17 Integrity in information systems.- 18 Detecting data integrity failures.- 19 The effects of time on integrity in information systems.- Three General Information.- Index of contributors.- Keyword index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497