Journal: Computers & Security

Volume 13, Issue 8

622 -- 627Harold Joseph Highland. Random bits & bytes
628 -- 636Jon Ølnes. Development of security policies
637 -- 645Ken Lindup. The cyberpunk age
647 -- 650Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe. Security evaluation in information technology standards
661 -- 671Imtiaz Mohammed, David M. Dilts. Design for dynamic user-role-based security
673 -- 680Sebastiaan H. von Solms, Isak van der Merwe. The management of computer security profiles using a role-oriented approach
681 -- 686Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu. Access control with binary keys
687 -- 697Helen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli. A computer package for measuring the strength of encryption algorithms