Journal: Computers & Security

Volume 5, Issue 4

277 -- 278Harold Joseph Highland. In this issue ..
290 -- 295William T. Tener. Detection of control deterioration using decision support systems
296 -- 308Linda S. Rutledge, Lance J. Hoffman. A survey of issues in computer network security
309 -- 313Philip M. Stanley. Computer crime investigation and investigators
314 -- 324Paul A. Karger. Authentication and discretionary access control in computer networks
325 -- 327Ivan Ekebrink. Data security in terminalized system
328 -- 335Vangalur S. Alagar. A human approach to the technological challenges in data security
336 -- 339Gerald E. Murine. Secure software's impact on reliability
340 -- 343Harold Joseph Highland. How to modify a microcomputer operating system for added security
344 -- 346Hilmi Erdem. Host cryptographic operations: A software implementation
347 -- 349Patrick Leahy. Privacy and progress