Journal: Computers & Security

Volume 13, Issue 6

458 -- 465Harold Joseph Highland. Random bits & bytes
467 -- 471Thomas Lillywhite. IT security standards and the adoption of a benchmarking approach
473 -- 480Ian M. Symonds. Security in distributed and client/server systems - A management view
481 -- 483Edwin B. Heinlein. 17th National Computer Security Conference - An opinion
495 -- 508Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis. Intrusion detection: Approach and performance issues of the SECURENET system
509 -- 525Bhavani M. Thuraisingham. Security issues for federated database systems
527 -- 531Peter B. Ladkin, Harold W. Thimbleby. Comments on a paper by Voas, Payne and Cohen: A model for detecting the existence of software corruption in real time