Integrity and Internal Control in Information Systems VI

This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes. Integrity and Internal Control in Information Systems VI represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Sixth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Lausanne, Switzerland in November 2003. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and IT-auditing.

[1]  Dirk Vermeir,et al.  Preferred answer sets for ordered logic programs , 2006, Theory Pract. Log. Program..

[2]  Gabriel M. Kuper,et al.  A unified constraint model for XML , 2001, WWW '01.

[3]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[4]  Thomas Eiter,et al.  Preferred Answer Sets for Extended Logic Programs , 1999, Artif. Intell..

[5]  Georg Gottlob,et al.  Complexity and expressive power of logic programming , 1997, Proceedings of Computational Complexity. Twelfth Annual IEEE Conference.

[6]  Gio Wiederhold,et al.  Value-added Mediation in Large-Scale Information Systems , 1995, DS-6.

[7]  Xin He,et al.  Scalar aggregation in inconsistent databases , 2003, Theor. Comput. Sci..

[8]  Salvatore J. Stolfo,et al.  The merge/purge problem for large databases , 1995, SIGMOD '95.

[9]  Wolfgang Faber,et al.  Declarative problem-solving in DLV , 2001 .

[10]  Paris C. Kanellakis,et al.  Elements of Relational Database Theory , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[11]  Edmund M. Clarke,et al.  Model Checking , 1999, Handbook of Automated Reasoning.

[12]  Jack Minker,et al.  On Indefinite Databases and the Closed World Assumption , 1987, CADE.

[13]  Jan Chomicki,et al.  On the Computational Complexity of Consistent Query Answers , 2002, ArXiv.

[14]  Michael Kifer,et al.  Applications of Annotated Predicate Calculus to Querying Inconsistent Databases , 2000, Computational Logic.

[15]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[16]  Sushil Jajodia,et al.  A Multilevel Secure Object- Oriented Data Model , 2006 .

[17]  Chiaki Sakama,et al.  Prioritized logic programming and its application to commonsense reasoning , 2000, Artif. Intell..

[18]  Jennifer Widom,et al.  Local verification of global integrity constraints in distributed databases , 1993, SIGMOD '93.

[19]  Jan Chomicki,et al.  Computing consistent query answers using conflict hypergraphs , 2004, CIKM '04.

[20]  Renée J. Miller,et al.  Towards Inconsistency Management in Data Integration Systems , 2003, IIWeb.

[21]  Marianne Winslett,et al.  Reasoning about Action Using a Possible Models Approach , 1988, AAAI.

[22]  Kevin J. Sullivan,et al.  COM revisited: tool-assisted modelling of an architectural framework , 2000, SIGSOFT '00/FSE-8.

[23]  J. Ross Quinlan,et al.  Learning decision tree classifiers , 1996, CSUR.

[24]  Patrick Valduriez,et al.  Design and implementation of an extendible integrity subsystem , 1984, SIGMOD '84.

[25]  Brajendra Panda,et al.  Analyzing Transaction Logs for Effective Damage Assessment , 2002, DBSec.

[26]  Erhard Rahm,et al.  Data Cleaning: Problems and Current Approaches , 2000, IEEE Data Eng. Bull..

[27]  Kyuseok Shim,et al.  Optimizing queries with materialized views , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[28]  Michael Stonebraker,et al.  Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.

[29]  Suzanne M. Embury,et al.  Increasing the Accuracy of Time-tabled Condition Monitoring , 2002, IICIS.

[30]  Gerard J. Holzmann,et al.  Design and validation of computer protocols , 1991 .

[31]  Andrew William Roscoe,et al.  Proving security protocols with model checkers by data independence techniques , 1999 .

[32]  Sushil Jajodia,et al.  Trusted recovery , 1999, CACM.

[33]  Marcos K. Aguilera,et al.  Matching events in a content-based subscription system , 1999, PODC '99.

[34]  Dennis Shasha,et al.  WebFilter: A High-throughput XML-based Publish and Subscribe System , 2001, VLDB.

[35]  Jan Chomicki,et al.  Consistent Answers from Integrated Data Sources , 2002, FQAS.

[36]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[37]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[38]  Jeffrey D. Ullman,et al.  Information integration using logical views , 1997, Theor. Comput. Sci..

[39]  Dennis Shasha,et al.  Filtering algorithms and implementation for very fast publish/subscribe systems , 2001, SIGMOD '01.

[40]  Paul G. Spirakis,et al.  Attack Propagation in Networks , 2003, Theory of Computing Systems.

[41]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[42]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[43]  Mukesh Dalal,et al.  Investigations into a Theory of Knowledge Base Revision , 1988, AAAI.

[44]  Leopoldo E. Bertossi,et al.  Logic Programs for Querying Inconsistent Databases , 2003, PADL.

[45]  Dennis Shasha,et al.  Declarative Data Cleaning: Language, Model, and Algorithms , 2001, VLDB.

[46]  Eric Monteith Genoa TIE, advanced boundary controller experiment , 2001, Seventeenth Annual Computer Security Applications Conference.

[47]  Jan Chomicki,et al.  Consistent query answers in inconsistent databases , 1999, PODS '99.

[48]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[49]  Ron van der Meyden,et al.  Logical Approaches to Incomplete Information: A Survey , 1998, Logics for Databases and Information Systems.

[50]  Jef Wijsen,et al.  Condensed Representation of Database Repairs for Consistent Query Answering , 2003, ICDT.

[51]  Samuel Madden,et al.  Continuously adaptive continuous queries over streams , 2002, SIGMOD '02.

[52]  Timo Soininen,et al.  Extending and implementing the stable model semantics , 2000, Artif. Intell..

[53]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[54]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.

[55]  Joann J. Ordille,et al.  Query-Answering Algorithms for Information Agents , 1996, AAAI/IAAI, Vol. 1.

[56]  Michael Stonebraker,et al.  Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.

[57]  François Bry,et al.  Query Answering in Information Systems with Integrity Constraints , 1997, IICIS.

[58]  Kenneth L. McMillan,et al.  Symbolic model checking: an approach to the state explosion problem , 1992 .

[59]  Jeannette M. Wing,et al.  A Case study in Model Checking Software Systems , 1997, Sci. Comput. Program..

[60]  Latha S. Colby,et al.  Algorithms for deferred view maintenance , 1996, SIGMOD '96.

[61]  Jan Chomicki,et al.  Query Answering in Inconsistent Databases , 2003, Logics for Emerging Applications of Databases.

[62]  Jennifer Widom,et al.  Implementing Set-Oriented Production Rules as an Extension to Starburst , 1991, VLDB.

[63]  Xiaolei Qian,et al.  Distribution Design of Integrity Constraints , 1988, Expert Database Conf..

[64]  John Grant,et al.  Logic-based approach to semantic query optimization , 1990, TODS.

[65]  Arnon Rosenthal,et al.  Administering Permissions for Distributed Data: Factoring and Automated Inference , 2001, DBSec.

[66]  Michael E. Lesk,et al.  Automatic sense disambiguation using machine readable dictionaries: how to tell a pine cone from an ice cream cone , 1986, SIGDOC '86.

[67]  Alon Y. Halevy,et al.  Recursive Query Plans for Data Integration , 2000, J. Log. Program..

[68]  Jan Chomicki,et al.  Specifying and Querying Database Repairs using Logic Programs with Exceptions , 2000, FQAS.

[69]  Michael J. Franklin,et al.  Efficient Filtering of XML Documents for Selective Dissemination of Information , 2000, VLDB.

[70]  Gabriel M. Kuper,et al.  Constraint Databases , 2010, Springer Berlin Heidelberg.

[71]  Jan Chomicki,et al.  Answer sets for consistent query answering in inconsistent databases , 2002, Theory and Practice of Logic Programming.

[72]  Susan Darling Urban,et al.  CONTEXT: A CONstrainT EXplanation Tool , 1992, Data Knowl. Eng..

[73]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[74]  S.D. Urban,et al.  The implementation and evaluation of integrity maintenance rules in an object-oriented database , 1992, [1992] Eighth International Conference on Data Engineering.

[75]  Jennifer Widom,et al.  Deriving Production Rules for Constraint Maintainance , 1990, VLDB.

[76]  Peter G. Neumann,et al.  Experience with EMERALD to Date , 1999 .

[77]  Susan Darling Urban ALICE: an assertion language for integrity constraint expression , 1989, [1989] Proceedings of the Thirteenth Annual International Computer Software & Applications Conference.

[78]  Jean-Marie Nicolas Logic for improving integrity checking in relational data bases⋆ , 2004, Acta Informatica.

[80]  Jan Jürjens UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[81]  Arnon Rosenthal,et al.  Document release versus data access controls: two sides of the same coin? , 2001, CIKM '01.

[82]  Raymond Reiter,et al.  Towards a Logical Reconstruction of Relational Database Theory , 1982, On Conceptual Modelling.

[83]  Jan Chomicki,et al.  Minimal-change integrity maintenance using tuple deletions , 2002, Inf. Comput..

[84]  Alon Y. Levy Combining artificial intelligence and databases for data integration , 1999 .

[85]  Wenfei Fan,et al.  Integrity constraints for XML , 2000, PODS '00.

[86]  Thomas Eiter,et al.  Efficient Evaluation of Logic Programs for Querying Data Integration Systems , 2003, ICLP.

[87]  Arjeh M. Cohen,et al.  Synchronized Multimedia Integration Language (SMIL) 2.0 , 1998 .

[88]  Ronald Fagin,et al.  Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..

[89]  Sergio Greco,et al.  Querying Inconsistent Databases , 2000, LPAR.

[90]  Maurizio Lenzerini,et al.  Source inconsistency and incompleteness in data integration , 2002, KRDB.

[91]  Sylvia L. Osborn,et al.  Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.

[92]  Maurizio Lenzerini,et al.  Data integration: a theoretical perspective , 2002, PODS.

[93]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[94]  Armin B. Cremers,et al.  AIM - An Integrity Monitor for the Database System INGRES , 1983, VLDB.

[95]  Sergio Greco,et al.  A Logic Programming Approach to the Integration, Repairing and Querying of Inconsistent Databases , 2001, ICLP.

[96]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[97]  David Notkin,et al.  Model checking large software specifications , 1996, SIGSOFT '96.

[98]  Carl E. Landwehr,et al.  A security model for military message systems , 1984, TOCS.

[99]  Solange Ghernaouti-Hélie,et al.  Internet et sécurité , 2002 .

[100]  Andrea Calì,et al.  On the decidability and complexity of query answering over inconsistent and incomplete databases , 2003, PODS.

[101]  Leopoldo E. Bertossi,et al.  Logic Programs for Consistently Querying Data Integration Systems , 2003, IJCAI.

[102]  Jos Warmer,et al.  The object constraint language , 1998 .

[103]  Gavin Lowe,et al.  Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[104]  Jarek Gryz,et al.  Query Rewriting Using Views in the Presence of Functional and Inclusion Dependencies , 1999, Inf. Syst..

[105]  Moshe Y. Vardi The complexity of relational query languages (Extended Abstract) , 1982, STOC '82.

[106]  Gio Wiederhold,et al.  Protecting Information when Access is Granted for Collaboration , 2000, DBSec.

[107]  Sylvia L. Osborn Mandatory access control and role-based access control revisited , 1997, RBAC '97.

[108]  Solange Ghernaouti-Hélie,et al.  Stratégie et ingénierie de la sécurité des réseaux , 1998 .

[109]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[110]  Amihai Motro,et al.  Multiplex: A Formal Model for Multidatabases and Its Implementation , 1999, NGITS.

[111]  Subhasish Mazumdar,et al.  Optimizing Distributed Integrity Constraints , 1993, DASFAA.

[112]  Peter Gärdenfors,et al.  Belief Revision , 1995 .

[113]  Suzanne M. Embury,et al.  Non-Intrusive Assessment of Organizational Data Quality , 2001, IQ.

[114]  John C. Mitchell,et al.  Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[115]  Michael Sipser,et al.  Introduction to the Theory of Computation , 1996, SIGA.

[116]  Alberto O. Mendelzon,et al.  Tableau Techniques for Querying Information Sources through Global Schemas , 1999, ICDT.

[117]  Susan Darling Urban,et al.  The design of a constraint/rule language for an object-oriented data model , 1995, J. Syst. Softw..

[118]  Tore Risch,et al.  Distributing semantic constraints between heterogeneous databases , 1997, Proceedings 13th International Conference on Data Engineering.

[119]  Michael Gruninger,et al.  ONTOLOGY Applications and Design , 2002 .

[120]  李幼升,et al.  Ph , 1989 .

[121]  Yanlei Diao,et al.  YFilter: efficient and scalable filtering of XML documents , 2002, Proceedings 18th International Conference on Data Engineering.

[122]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[123]  Ronald Fagin,et al.  Translating Web Data , 2002, VLDB.

[124]  Pierre Wolper,et al.  Automata-Theoretic Techniques for Modal Logics of Programs , 1986, J. Comput. Syst. Sci..

[125]  John Grant,et al.  A logic-based approach to data integration , 2001, Theory and Practice of Logic Programming.

[126]  Divesh Srivastava,et al.  Answering Queries with Aggregation Using Views , 1996, VLDB.

[127]  Ashish Gupta,et al.  Partial information based on integrity constraint checking , 1995 .

[128]  Catherine A. Meadows,et al.  The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..

[129]  Joshua D. Guttman,et al.  Information Flow in Operating Systems: Eager Formal Methods , 2003 .

[130]  J. Roy,et al.  Understanding Web services , 2001 .

[131]  Gio Wiederhold,et al.  Incremental Recomputation of Active Relational Expressions , 1991, IEEE Trans. Knowl. Data Eng..