Journal: Computers & Security

Volume 24, Issue 3

175 -- 176E. Eugene Schultz. Security dilemmas with Microsoft s Internet Explorer
177 -- 187. Security views - Malware update
188 -- 191. Smart card based authentication - any future?
192 -- 207Almut Herzog, Nahid Shahmehri. Performance of the Java security manager
208 -- 217Faisal Nabi. Secure business application logic for e-commerce systems
218 -- 231Xiu-Zhen Chen, Qing-Hua Zheng, Xiao-Hong Guan, Chen-Guang Lin, Jie Sun. Multiple behavior information fusion based quantitative threat evaluation
232 -- 245Konstantinos Rantos, Chris J. Mitchell. Matching key recovery mechanisms to business requirements
246 -- 260Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis. Information systems security policies: a contextual perspective