Journal: Computers & Security

Volume 10, Issue 7

586 -- 600Harold Joseph Highland. Random bits & bytes
612 -- 625Gerhard Steinke. Design aspects of access control in a knowledge base system
626 -- 636Viiveke Fåk. Computer verification of human users identity: A theoretical model and some evaluation criteria
639 -- 652Josep Domingo-Ferrer. Algorithm- sequenced access control
653 -- 660Dalenca Pottas, Sebastiaan H. von Solms. A computerized management reporting aid for a mainframe security system
661 -- 669M. L. Goyal, G. V. Singh. Access control in distributed heterogeneous database management systems