SlideShare a Scribd company logo
1 of 10
2_2.

                          Data Integrity      Risk Management

1. Data Integrity


                    1.




          1


  1.1.


         1) Alon Halevy




         2) Maurizio Lenzerini
3) Diego Calvanese




1.2.
                                       submission deadline

                       2013)

       1) ICDE – International Conference on Data

         Engineering
CONFERENCE
  o   Conference date: April 8-12, 2013
  IMPORTANT DATES FOR RESEARCH AND
  INDUSTRY PAPERS
  o   Abstract due: 17:00 PDT July 16, 2012
  o   Full paper submissions due: 17:00 PDT July 23,
  2012
  o   Notification to authors: October 14, 2012
  o   Final versions due: November 30, 2012


2) IGARSS – Geoscience and Remote Sensing IEEE

  International Symposium




  Start: July 21, 2013

  End: July 26, 2013
Address:Melbourne, Australia

3) DEXA – Database and Expert Systems Applications




  Vienna (Austria) September 3 - 6, 2012

  DEXA 2013 -International Conference on Database

  and Expert Systems Applications

  Send this CFP to us by mail: cfp@ourglocal.org

  Deadline: TBD | Date: TBD

  Place/Country: TBD/TBD

  http://www.dexa.org/dexa2012

  23rd International Conference on Database and

  Expert Systems Applications - DEXA 2012




4) OTM Workshops
"9th OTM Academy"
          September 10 - 11, 2012, Rome, Italy,
         In conjunction with
         OnTheMove Federated Conferences and
         Workshops (OTM'12)
       5) DILS – Data Integration in the Life Sciences




         Data Integration in the Life Sciences 2012
         June 28-29, 2012 University of Maryland, USA
1.3.            Journal ISI     SCOPUS


                        submission deadline

                       2013)

         Towards generating a data integrity standard
Received 26 October 1998. Revised 21 June 1999.
   Accepted 7 August 1999. Available online 4 January
   2000.
         The semantics of an extended referential integrity for
   a multilevel secure relational data model
   Received 21 August 2002. Revised 22 January 2003.
   Accepted 26 May 2003. Available online 14 August 2003.




         A high performance data integrity assurance based
   on the determinant technique
       Received 14 February 2010. Revised 26 April 2010.
       Accepted 6 May 2010. Available online 20 May 2010.
         Integrity analysis: methods for automating data
   quality assurance
       Available online 10 June 2003.
         Integrity protecting hierarchical concealed data
   aggregation for wireless sensor networks
       Received 17 January 2010. Revised 16 December
       2010. Accepted 10 January 2011. Available online 19
       January 2011. Responsible Editor: S. Sicari.
1.4.
5                     Software

           Development, Security Requirement, Risk

           Management, Quality Improvement, Process model

                              5          APSEC, ICSE, SEKE,

           ACISICIS, ISICT

                                   ISI

                                   SCOPUS       An approach

           for source code classification to enhance

           maintainability



2. Risk Management
  2.1.


         1) Barry Boehm
2) Victor Basili




       3) Donald W. Davies




2.2.


       1) MASS – International Conference on Management

         and Service Science
2) HICSS – Hawaii International Conference on System

  Science




3) WiCom – International Conference on Wireless

  Communications, Networking and Mobile Computing




4) ICEE – International Conference on E-Business and

  E-Goverment
5) SMC – IEEE International Conference on Systems,

  Man, and Cybernetics

More Related Content

Similar to Homework#2_5470908121

March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...AIRCC Publishing Corporation
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 InternationalDr. MAQSOOD MAHMUD, PhD.
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...AIRCC Publishing Corporation
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
 

Similar to Homework#2_5470908121 (20)

March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
Web data mining
Web data miningWeb data mining
Web data mining
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 International
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Profile
ProfileProfile
Profile
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 

Homework#2_5470908121

  • 1. 2_2. Data Integrity Risk Management 1. Data Integrity 1. 1 1.1. 1) Alon Halevy 2) Maurizio Lenzerini
  • 2. 3) Diego Calvanese 1.2. submission deadline 2013) 1) ICDE – International Conference on Data Engineering
  • 3. CONFERENCE o Conference date: April 8-12, 2013 IMPORTANT DATES FOR RESEARCH AND INDUSTRY PAPERS o Abstract due: 17:00 PDT July 16, 2012 o Full paper submissions due: 17:00 PDT July 23, 2012 o Notification to authors: October 14, 2012 o Final versions due: November 30, 2012 2) IGARSS – Geoscience and Remote Sensing IEEE International Symposium Start: July 21, 2013 End: July 26, 2013
  • 4. Address:Melbourne, Australia 3) DEXA – Database and Expert Systems Applications Vienna (Austria) September 3 - 6, 2012 DEXA 2013 -International Conference on Database and Expert Systems Applications Send this CFP to us by mail: cfp@ourglocal.org Deadline: TBD | Date: TBD Place/Country: TBD/TBD http://www.dexa.org/dexa2012 23rd International Conference on Database and Expert Systems Applications - DEXA 2012 4) OTM Workshops
  • 5. "9th OTM Academy" September 10 - 11, 2012, Rome, Italy, In conjunction with OnTheMove Federated Conferences and Workshops (OTM'12) 5) DILS – Data Integration in the Life Sciences Data Integration in the Life Sciences 2012 June 28-29, 2012 University of Maryland, USA 1.3. Journal ISI SCOPUS submission deadline 2013) Towards generating a data integrity standard
  • 6. Received 26 October 1998. Revised 21 June 1999. Accepted 7 August 1999. Available online 4 January 2000. The semantics of an extended referential integrity for a multilevel secure relational data model Received 21 August 2002. Revised 22 January 2003. Accepted 26 May 2003. Available online 14 August 2003. A high performance data integrity assurance based on the determinant technique Received 14 February 2010. Revised 26 April 2010. Accepted 6 May 2010. Available online 20 May 2010. Integrity analysis: methods for automating data quality assurance Available online 10 June 2003. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks Received 17 January 2010. Revised 16 December 2010. Accepted 10 January 2011. Available online 19 January 2011. Responsible Editor: S. Sicari. 1.4.
  • 7. 5 Software Development, Security Requirement, Risk Management, Quality Improvement, Process model 5 APSEC, ICSE, SEKE, ACISICIS, ISICT ISI SCOPUS An approach for source code classification to enhance maintainability 2. Risk Management 2.1. 1) Barry Boehm
  • 8. 2) Victor Basili 3) Donald W. Davies 2.2. 1) MASS – International Conference on Management and Service Science
  • 9. 2) HICSS – Hawaii International Conference on System Science 3) WiCom – International Conference on Wireless Communications, Networking and Mobile Computing 4) ICEE – International Conference on E-Business and E-Goverment
  • 10. 5) SMC – IEEE International Conference on Systems, Man, and Cybernetics