Journal: Computers & Security

Volume 13, Issue 4

278 -- 286Harold Joseph Highland. Random bits & bytes
287 -- 293Karl Rihaczek. Data interchange and legal security - signature surrogates
295 -- 301William List, Rob Melville. Integrity in information systems - Executive summary
317 -- 333Edo Roos Lindgreen, I. S. Herschberg. On the validity of the Bell-La Padula model
335 -- 347Dennis Longley, S. Vasudevan. Effect of key generators on the automatic search for flaws in key management schemes
349 -- 364D. N. J. Mostert, Sebastiaan H. von Solms. A methodology to include computer security, safety and resilience requirements as part of the user requirement