Journal: Computers & Security

Volume 5, Issue 2

83 -- 0Harold Joseph Highland. In this issue..
84 -- 0Johan Essén. New member of the International Board of Editors
85 -- 93Harold Joseph Highland. Electromagnetic radiation revisited
101 -- 113Willis H. Ware. Emerging privacy issues
114 -- 121Charles Cresson Wood, Howard M. Zeidler. Security modules: Potent information security system components
122 -- 127L. Hoebeke. Computer security - Prevention: Lessons from the operation of a nuclear power plant
128 -- 134Rick F. van der Lans. Data security in a relational database environment
135 -- 140Roy Martin Richards Jr., Jan Yestingsmeier. Risk management - a key to security in the electronic funds transfer system
141 -- 144Matt Bishop. A pauper's callback scheme
145 -- 149Cees J. A. Jansen. On the key storage requirements for secure terminals
167 -- 0June M. Power, Steve R. Wilbur. Authentication in a heterogeneous environment
167 -- 0Willis H. Ware. Emerging privacy issues
167 -- 0Viiveke Fåk. Software versus hardware encryption - Is there any difference today?
167 -- 0Frederick G. Tompkins, Russel S. Rice. Intergrating security activities into the software development life cycle and the software quality assurance process
167 -- 168T. K. Worthington, J. J. Chainer, J. D. Willford, S. C. Gunderson. IBM dynamic signature verification
167 -- 0John M. Carroll, Helmut Jürgensen. Design of a secure relational data base
168 -- 0John G. Beatson. Development and organization of the audit and security functions
168 -- 0Roger T. Doswell. The audit, control and security of the project life cycle - Pre-implementation stage
168 -- 0Peter P. C. H. Kingston, Martin Goulbourn. Security for small business computers
168 -- 169Philip M. Stanley. Educating computer crime investigators
168 -- 0William T. Tener. Decision support systems - A necessity for effective auditing of controls
168 -- 0Ivan Ekerbrink. Security of electronic transactions
168 -- 0Hans-Jürgen Kugler. Concepts of protection in the IFIP WG 2.7 reference model for command and response languages
169 -- 0Gerald E. Murine. Producing reliable, secure software
169 -- 0Donald W. Davies. How to use the DES safely
169 -- 0Charles Cresson Wood. Establishing technical systems security standards at a large multinational bank