Journal: Computers & Security

Volume 10, Issue 2

92 -- 100Harold Joseph Highland. Random bits & bytes
101 -- 110Karl Rihaczek. The harmonized ITSEC evaluation criteria
111 -- 114Harold W. Thimbleby. Can viruses ever be useful?
117 -- 127Jim Press. Secure transfer of identity and privilege attributes in an open systems environment
129 -- 139J. K. Jan, Chin-Chen Chang, S. J. Wang. A dynamic key-lock-pair access control scheme
141 -- 159Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou. Data security in medical information systems: The Greek case