Journal: Computers & Security

Volume 25, Issue 7

475 -- 476E. Eugene Schultz. Issues concerning the distribution of vulnerability information
486 -- 493Hazel Lacohée, Andrew D. Phippen, Steven Furnell. Risk and restitution: Assessing how users establish online trust
494 -- 497Rossouw von Solms, Sebastiaan H. von Solms. Information security governance: Due care
498 -- 506Vinay M. Igure, Sean A. Laughter, Ronald D. Williams. Security issues in SCADA networks
507 -- 521Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias. A dynamic context-aware access control architecture for e-services
522 -- 538Maria Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors
539 -- 550Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data