Journal: Computers & Security

Volume 20, Issue 7

546 -- 560Bill Hancock. Security View
561 -- 567Stephen Hinde. Lessons Learned
568 -- 572Stephen Hinde. Incalculable potential for damage by cyber-terrorism
573 -- 576Chris Pounder. The European Union Proposal for a Policy Towards Network and Information Security
577 -- 584Mariana Gerber, Rossouw von Solms. From Risk Analysis to Security Requirements
592 -- 611David W. Chadwick, Andrew Basden. Evaluating Trust in a Public Key Certification Authority
612 -- 619Chu-Hsing Lin. Hierarchical key assignment without public-key cryptography
620 -- 634E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy. Usability and Security An Appraisal of Usability Issues in Information Security Methods