Databases Reference
In-Depth Information
38. Securities
and
Exchange
Commission.
Guidance
to
Broker-Dealers
on
the
Use
of
Electronic
Storage
Media
under
the
National
Com-
merce
Act
of
2000
with
Respect
to
Rule
17a-4(f).
Online
at
39. Australian Securities and Exchange Commission. Clerp 9 corporate reporting
40. Ontario Securities and Exchange Commission. Multilateral Instrument 52-
111 - Reporting on Internal Control over Financial Reporting.
Online at
http://www.osc.gov.on.ca
,
2005.
41. Radu
Sion
and
Simona
Boboila.
Strong
WORM,
Network
Security
and
Applied
Cryptography
Lab
Technical
Report
02-2007,
Online
at
42. Richard T. Snodgrass, Shilong (Stanley) Yao, and Christian S. Collberg. Tamper
detection in audit logs. In
VLDB
, pages 504-515, 2004.
44. Sun Microsystems. Storagetek Volsafe secure media technology. Online at
45. Sun Microsystems.
Sun StorageTek 5320 NAS Appliance.
Online at
46. Jeffrey D. Ullman, Hector Garcia-Molina, and Jennifer Widom.
Database Sys-
tems: The Complete Book
. Prentice Hall, 2001.
47. Ian H. Witten, Alistair Moffat, and Timothy C. Bell.
Managing Gigabytes:
Compressing and Indexing Documents and Images, Second Edition
.
Morgan
Kaufmann, 1999.
48. William Yurcik and Ragib Hasan. Toward one strong national breach disclosure
law - justification and requirements. In
Workshop on the Economics of Securing
the Information Infrastructure
, Alexandria, VA, USA, October 2006.
49. Zantaz.
Zantaz
Digital
Safe.
Online
at
50. Qingbo Zhu and Windsor W. Hsu. Fossilized index: The linchpin of trustworthy
non-alterable electronic records. In
Proceedings of the ACM SIGMOD Interna-
tional Conference on Management of Data
, pages 395-406. ACM, June 2005.