researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
2
, Issue
3
213
--
0
Harold Joseph Highland
.
Editorial
218
--
222
Jerome Lobel
.
The state-of-the-art in computer security
223
--
229
Charles Cresson Wood
.
Enhancing information security with the information resource management approach
230
--
236
John M. Carroll
.
Decision support for risk analysis
237
--
241
Brian G. P. Fry
,
William F. Main
.
A conceptual methodology for evaluating security requirements for data assets
242
--
247
Harvey S. Koch
.
Implementing an integrated test facility audit using differential files
248
--
255
H. Rex Hartson
.
Teaching protection in computing: A research-oriented graduate course
256
--
260
Jan H. P. Eloff
.
Selection process for security packages
261
--
267
F. Ayoub
.
The design of complete encryption networks using cryptographically equivalent permutations
268
--
274
Arthur Sorkin
.
Requirements for a secure terminal switch
275
--
280
Norman R. Bottom Jr.
.
An informational theory of security