Journal: Computers & Security

Volume 22, Issue 3

174 -- 175. From the editor-in-chief: Virus and worm trends
176 -- 187E. Eugene Schultz. Security views
188 -- 192Stephen Hinde. Cyber-terrorism in context
193 -- 195Hank Wolfe. Evidence acquisition
196 -- 203Hassan Aljifri, Diego Sánchez Navarro. International legal aspects of cryptography: Understanding cryptography
204 -- 206Rolf Moulton, Robert S. Coles. A contest to evaluate IT security services management
207 -- 211Chris Pounder. Governments act to improve security
214 -- 232Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen. Analysis of vulnerabilities in Internet firewalls
233 -- 244Helen van de Haar, Rossouw von Solms. A model for deriving information security control attribute profiles
245 -- 255Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang. Generalization of proxy signature-based on discrete logarithms
256 -- 264Phillip J. Brooke, Richard F. Paige. Fault trees for security system design and analysis