Journal: Computers & Security

Volume 13, Issue 5

372 -- 378Harold Joseph Highland. Random bits & bytes
379 -- 384Leon Strous. Security evaluation criteria
385 -- 391Michael J. Ganley. Digital signatures and their uses
392 -- 400Bernard P. Zajac Jr.. Cost effectiveness of anti-viral scanners
411 -- 435Karin P. Badenhorst, Jan H. P. Eloff. TOPM: a formal approach to the optimization of information technology risk management
437 -- 450Eike Born, Helmut G. Stiegler. Discretionary access control by means of usage conditions