Journal: Computers & Security

Volume 3, Issue 1

3 -- 7Rolf Moulton. Data security is a management responsibility
9 -- 19Harvey S. Koch. Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation
21 -- 28James A. Schweitzer. Personal workstation automation security vulnerabilities
29 -- 34Ruth A. Seif. Contingency planning in the banking community
35 -- 41Arthur E. Oldehoeft, Robert McDonald. A software scheme for user-controlled file encryption
43 -- 44Sig Porter. Cryptology and number sequences: Pseudorandom, random, and perfectly random
45 -- 47Albert A. Mullin. A note on the mathematics of public-key cryptosystems
53 -- 55Michael Comer. Computer crime needs international countermeasures