Journal: Computers & Security

Volume 21, Issue 6

481 -- 490E. Eugene Schultz. Security Views
491 -- 496Stephen Hinde. The Blue Screen of Death and other deadly bugs
497 -- 502Andy Nikishin. I-Worm.Lentin (aka Yaha)
503 -- 505Chris Pounder. The US s National Strategy for Homeland Security
506 -- 513Jon David. Policy enforcement in the workplace
514 -- 519August Bequai. White collar crime: a handmaiden of international tech terrorism
520 -- 521Sarah Hilley. Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK
526 -- 531E. Eugene Schultz. A framework for understanding and predicting insider attacks
557 -- 564Virginia E. Rezmierski, Marshall R. Seese Jr., Nathaniel St. Clair II. University systems security logging: who is doing it and how far can they go?
565 -- 570Tzer-Shyong Chen, Yu-Fang Chung. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm