Journal: Computers & Security

Volume 11, Issue 4

294 -- 306Harold Joseph Highland. Random bits & bytes
307 -- 313R. Dixon, C. Marston, P. Collier. A report on the joint CIMA and IIA computer fraud survey
327 -- 340. Information security administration model: A management model to help identify the best practices of the administration function within the security group
347 -- 355Gunar E. Liepins, H. S. Vaccaro. Intrusion detection: Its role and validation
357 -- 369Jie Wu, Eduardo B. Fernández, Ruiguang Zhang. Some extensions to the lattice model for computer security