Description

Book Synopsis
1 Propagating integrity information among interrelated databases.- 2 Integrity constraint enforcement in a multidatabase using distributed active rules.- 3 The constraint operator of MedLan: its efficient implementation and use.- 4 Growing dependency on IT: the consequences thereof for the organization and for IT-auditors.- 5 TOP: an example of complex application controls.- 6 Algebra for databases with explicit markings of damaged data.- 7 Application of models from epidemiology to metrics for computer virus risk.- 8 Integrity control of spreadsheets: organisation & tools.- 9 Design basis for achieving information integrity a feedback control system approach.- 10 Modification of integrity constraints through knowledge discovery.- 11 Managing data quality and integrity in federated databases.- 12 A logical formalization of integrity policies for database management systems.- 13 Maintaining integrity constraints and security in real-time database systems.- 14 Assurance what is it?.- Two: General Information.- Index of contributors.- Keyword index.

Table of Contents
Preface. Part One: IFIP TC-11 Working Group 11.5. 1. Propagating Integrity Information Among Interrelated Databases; A. Rosenthal, E. Sciore. 2. Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules; L.G. Gomez, S.D. Urban. 3. The Constraint Operator of MedLan: Its Efficient Implementation and Use; P. Asirelli, et al. 4. Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors; M.E. van Biene-Hershey. 5. TOP: An Example of Complex Application Controls; M. Korver. 6. Algebra for Databases with Explicit Markings of Damaged Data; G. Rumolo, S. Jajodia. 7. Application of Models from Epidemiology to Metrics for Computer Virus Risk; J.L. Aron, R.A. Gove. 8. Integrity Control of Spreadsheets: Organisation & Tools; K. Rajalingham, D. Chadwick. 9. Design Basis for Achieving Information Integrity - a Feedback Control System Approach; V.V. Mandke, K.M. Nayar. 10. Modification of Integrity Constraints Through Knowledge Discovery; V. Atluri. 11. Managing Data Quality and Integrity in Federated Databases; M. Gertz. 12. A Logical Formalization of Integrity Policies for Database Management Systems; F. Cuppens, C. Saurel. 13. Maintaining Integrity Constraints and Security in Real-Time Database Systems; Q.N. Ahmed, S.V. Vrbsky. 14. Assurance - What is it? M.D. Abrams, et al. Part Two: General Information. IFIP TC-11. IFIP TC-11 Working Groups. Index of Contributors. Keyword Index.

Integrity and Internal Control in Information

Product form

£171.19

Includes FREE delivery

RRP £213.99 – you save £42.80 (20%)

Order before 4pm today for delivery by Thu 18 Dec 2025.

A Paperback / softback by Sushil Jajodia, William List, Graeme W. McGregor

Out of stock


    View other formats and editions of Integrity and Internal Control in Information by Sushil Jajodia

    Publisher: Springer-Verlag New York Inc.
    Publication Date: 21/03/2013
    ISBN13: 9781475755336, 978-1475755336
    ISBN10: 1475755333

    Description

    Book Synopsis
    1 Propagating integrity information among interrelated databases.- 2 Integrity constraint enforcement in a multidatabase using distributed active rules.- 3 The constraint operator of MedLan: its efficient implementation and use.- 4 Growing dependency on IT: the consequences thereof for the organization and for IT-auditors.- 5 TOP: an example of complex application controls.- 6 Algebra for databases with explicit markings of damaged data.- 7 Application of models from epidemiology to metrics for computer virus risk.- 8 Integrity control of spreadsheets: organisation & tools.- 9 Design basis for achieving information integrity a feedback control system approach.- 10 Modification of integrity constraints through knowledge discovery.- 11 Managing data quality and integrity in federated databases.- 12 A logical formalization of integrity policies for database management systems.- 13 Maintaining integrity constraints and security in real-time database systems.- 14 Assurance what is it?.- Two: General Information.- Index of contributors.- Keyword index.

    Table of Contents
    Preface. Part One: IFIP TC-11 Working Group 11.5. 1. Propagating Integrity Information Among Interrelated Databases; A. Rosenthal, E. Sciore. 2. Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules; L.G. Gomez, S.D. Urban. 3. The Constraint Operator of MedLan: Its Efficient Implementation and Use; P. Asirelli, et al. 4. Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors; M.E. van Biene-Hershey. 5. TOP: An Example of Complex Application Controls; M. Korver. 6. Algebra for Databases with Explicit Markings of Damaged Data; G. Rumolo, S. Jajodia. 7. Application of Models from Epidemiology to Metrics for Computer Virus Risk; J.L. Aron, R.A. Gove. 8. Integrity Control of Spreadsheets: Organisation & Tools; K. Rajalingham, D. Chadwick. 9. Design Basis for Achieving Information Integrity - a Feedback Control System Approach; V.V. Mandke, K.M. Nayar. 10. Modification of Integrity Constraints Through Knowledge Discovery; V. Atluri. 11. Managing Data Quality and Integrity in Federated Databases; M. Gertz. 12. A Logical Formalization of Integrity Policies for Database Management Systems; F. Cuppens, C. Saurel. 13. Maintaining Integrity Constraints and Security in Real-Time Database Systems; Q.N. Ahmed, S.V. Vrbsky. 14. Assurance - What is it? M.D. Abrams, et al. Part Two: General Information. IFIP TC-11. IFIP TC-11 Working Groups. Index of Contributors. Keyword Index.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account