-
2
-
-
1842511823
-
-
The Institute of Internal Auditors Research Foundation Altamonte Springs, FL
-
Albrecht, W., Howe, K. and Romney, M. (1984), Deterring Fraud: The Internal Auditor's Perspective, The Institute of Internal Auditors Research Foundation, Altamonte Springs, FL.
-
(1984)
Deterring Fraud: The Internal Auditor's Perspective
-
-
Albrecht, W.1
Howe, K.2
Romney, M.3
-
3
-
-
0003967323
-
-
Prentice Hall Upper Saddle River, NJ
-
Arens, A.A. and Loebbecke, J.K. (2000), Auditing: An Integrated Approach, 8th ed., Prentice Hall, Upper Saddle River, NJ.
-
(2000)
Auditing: An Integrated Approach, 8th ed
-
-
Arens, A.A.1
Loebbecke, J.K.2
-
4
-
-
0001772218
-
An experimental study of internal control judgements
-
Spring
-
Ashton, R. (1974), “An experimental study of internal control judgements”, Journal of Accounting Research, Vol. 12 No. 1, Spring, pp. 143-157.
-
(1974)
Journal of Accounting Research
, vol.12
, Issue.1
, pp. 143-157
-
-
Ashton, R.1
-
5
-
-
0002549014
-
Descriptive modelling of auditor's internal control judgements: Replication and extension
-
Spring
-
Ashton, R. and Brown, R. (1980), “Descriptive modelling of auditor's internal control judgements: Replication and extension”, Journal of Accounting Research, Vol. 18 No. 1, Spring, pp. 269-277.
-
(1980)
Journal of Accounting Research
, vol.18
, Issue.1
, pp. 269-277
-
-
Ashton, R.1
Brown, R.2
-
6
-
-
0031382313
-
A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
-
NIST VA
-
Bertino, E., Ferrari, E. and Atluri, V. (1997), “A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems”, Proceedings: Second ACM Workshop on Role-based Access Control, NIST, VA, pp. 1-12.
-
(1997)
Proceedings: Second ACM Workshop on Role-based Access Control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
34648817144
-
MIATA: A machine independent audit trail analyser
-
May
-
Best, P., Mohay, G. and Anderson, A. (1997), “MIATA: A machine independent audit trail analyser”, Australian Computer Journal, Vol. 29 No. 2, May, pp. 57-63.
-
(1997)
Australian Computer Journal
, vol.29
, Issue.2
, pp. 57-63
-
-
Best, P.1
Mohay, G.2
Anderson, A.3
-
9
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE Computer Society Press Oakland, CA
-
Clark, D. and Wilson, D. (1987), “A comparison of commercial and military computer security policies”, IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA.
-
(1987)
IEEE Symposium on Security and Privacy
-
-
Clark, D.1
Wilson, D.2
-
10
-
-
0004189288
-
-
Wiley New York, NY
-
Davies, D.W. and Price, W.L. (1989), Security for Computer Networks, 2nd ed., Wiley, New York, NY.
-
(1989)
Security for Computer Networks, 2nd ed
-
-
Davies, D.W.1
Price, W.L.2
-
11
-
-
84949252566
-
-
National Institute of Standards and Technology Gaithersburg, MD
-
Ferraiolo, D.F., Gilbert, D.M. and Lynch, N. (1992), Assessing Federal and Commercial Information Security Needs (USA), National Institute of Standards and Technology, Gaithersburg, MD.
-
(1992)
Assessing Federal and Commercial Information Security Needs
-
-
Ferraiolo, D.F.1
Gilbert, D.M.2
Lynch, N.3
-
12
-
-
84986029175
-
Control & audit of SAP R/3 logical access security
-
Haelst, W. and Jansen, K. (1997), “Control & audit of SAP R/3 logical access security”, IS Audit & Control Journal, Vol. 3, pp. 37-44.
-
(1997)
IS Audit & Control Journal
, vol.3
, pp. 37-44
-
-
Haelst, W.1
Jansen, K.2
-
13
-
-
0003045704
-
Internal control judgments and effects of experience: Replications and extensions
-
Autumn
-
Hamilton, R. and Wright, W. (1982), “Internal control judgments and effects of experience: Replications and extensions”, Journal of Accounting Research, Vol. 20 No. 2, Autumn, pp. 756-765.
-
(1982)
Journal of Accounting Research
, vol.20
, Issue.2
, pp. 756-765
-
-
Hamilton, R.1
Wright, W.2
-
14
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
NIST VA
-
Kuhn, D. (1997), “Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems”, Proceedings: Second ACM Workshop on Role-based Access Control, NIST, VA, pp. 23-30.
-
(1997)
Proceedings: Second ACM Workshop on Role-based Access Control
, pp. 23-30
-
-
Kuhn, D.1
-
15
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt, T.F. (1993), “A survey of intrusion detection techniques”, Computers & Security, Vol. 12 No. 4, pp. 405-418.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
17
-
-
84961841379
-
System implications of information privacy
-
Spring
-
Peterson, H.E. and Turn, R. (1967), “System implications of information privacy”, Proceedings AFIPS Conference, Vol. 30, Spring, pp. 291-300.
-
(1967)
Proceedings AFIPS Conference
, vol.30
, pp. 291-300
-
-
Peterson, H.E.1
Turn, R.2
-
19
-
-
84909718092
-
Reflections on some recent widespread computer break-ins
-
Reid, B. (1987), “Reflections on some recent widespread computer break-ins”, Commun. ACM, Vol. 30 No. 2, pp. 103-105.
-
(1987)
Commun. ACM
, vol.30
, Issue.2
, pp. 103-105
-
-
Reid, B.1
-
22
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S. and Coyne, E.J. (1996), “Role-based access control models”, Computer, Vol. 29 No. 2, pp. 38-47.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
23
-
-
0024683697
-
Password cracking a game of wits
-
Seeley, D. (1989) “Password cracking a game of wits”, Commun. ACM, Vol. 32 No. 6, pp. 700-704.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 700-704
-
-
Seeley, D.1
-
24
-
-
0024122965
-
Haystack: An intrusion detection system
-
Orlando, FL, December
-
Smaha, S.E. (1988), “Haystack: An intrusion detection system”, 4th Aerospace Computer Security Applications Conference, Orlando, FL, December, pp. 37-44.
-
(1988)
4th Aerospace Computer Security Applications Conference
, pp. 37-44
-
-
Smaha, S.E.1
-
25
-
-
0024681099
-
The Internet worm: Crisis and aftermath
-
Spafford, E.H. (1989), “The Internet worm: Crisis and aftermath”, Commun. ACM, Vol. 32 No. 6, pp. 678-687.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.H.1
-
26
-
-
84970207099
-
The influence of segregation of duties on internal control judgements
-
Srinidhi, B. (1994), “The influence of segregation of duties on internal control judgements”, Journal of Accounting, Auditing & Finance, Vol. 9 No. 3, pp. 423-444.
-
(1994)
Journal of Accounting, Auditing & Finance
, vol.9
, Issue.3
, pp. 423-444
-
-
Srinidhi, B.1
-
27
-
-
0024011325
-
Stalking the wiley hacker
-
Stoll, C. (1988), “Stalking the wiley hacker”, Commun. ACM, Vol. 31 No. 5, pp. 484-497.
-
(1988)
Commun. ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
|