Journal: Computers & Security

Volume 29, Issue 8

813 -- 814Eugene H. Spafford. Security, technology, publishing, and ethics (Part I)
815 -- 830Jinpeng Wei, Calton Pu. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems
831 -- 839Michael Workman. A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives
840 -- 847E. Kritzinger, Sebastiaan H. von Solms. Cyber security for home users: A new way of protection through awareness enforcement
848 -- 858Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. Access control for smarter healthcare using policy spaces
859 -- 874Ioanna Kantzavelou, Sokratis K. Katsikas. A game-based intrusion detection mechanism to confront internal attackers
875 -- 890Javier Herranz, Stan Matwin, Jordi Nin, Vicenç Torra. Classifying data from protected statistical datasets
891 -- 902Fred Cohen. A method for forensic analysis of control