Integrity and Internal Control in Information Systems VI

IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13–14 November 2003, Lausanne, Switzerland

  • Sushil Jajodia
  • Leon Strous

Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 140)

Table of contents

  1. Front Matter
    Pages i-ix
  2. Refereed papers

    1. Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane
      Pages 1-11
    2. Sebastian Höhn, Jan Jürjens
      Pages 13-30
    3. David Basin, Kunihiko Miyazaki, Kazuo Takaragi
      Pages 31-47
    4. Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert France
      Pages 49-65
    5. Naren B. Kodali, Csilla Farkas, Duminda Wijesekera
      Pages 67-81
    6. Claudio Bettini, X. Sean Wang, Sushil Jajodia
      Pages 83-105
    7. Elmari Pretorius, Basie von Solms
      Pages 107-113
    8. Alexandre Aellig, Philippe Oechslin
      Pages 115-124
    9. Indrajit Ray, Junxing Zhang
      Pages 125-141
    10. Herman Balsters, Bert de Brock
      Pages 143-158
    11. Binling Jin, Suzanne M. Embury
      Pages 159-176
    12. Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman
      Pages 195-208
  3. Invited papers

  4. Panel session

  5. Back Matter
    Pages 255-257

About this book

Introduction

The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions: what precisely do business managers need in order to have confidence in the integrity of their information systems and their data and what are the challenges IT industry is facing in ensuring this integrity; what are the status and directions of research and development in the area of integrity and internal control; where are the gaps between business needs on the one hand and research / development on the other; what needs to be done to bridge these gaps. This sixth volume of IICIS papers, like the previous ones, contains interesting and valuable contributions to finding the answers to the above questions. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity.

Keywords

Audit COBIT Processing SAP Unified Modeling Language (UML) computer science data security information processing information security information system object oriented design organization security

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Leon Strous
    • 2
  1. 1.George Mason UniversityFairfaxUSA
  2. 2.De Nederlandsche Bank NVAmsterdamThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/b116855
  • Copyright Information Kluwer Academic Publishers 2004
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4020-7900-9
  • Online ISBN 978-1-4020-7901-6
  • Series Print ISSN 1571-5736
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace