researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
8
, Issue
1
2
--
0
Harold Joseph Highland
.
From the editor
3
--
13
Harold Joseph Highland
.
Random bits & bytes
15
--
21
Rolf Moulton
,
Robert P. Bigelow
.
Protecting ownership of proprietary information
23
--
24
Lance J. Hoffman
.
Risk analysis and computer security: Towards a theory at last
25
--
27
Bernard P. Zajac Jr.
.
Legal options to computer viruses
29
--
31
Jack Bologna
.
The one minute fraud auditor
35
--
41
Winfried Gleissner
.
A mathematical theory for the spread of computer viruses
43
--
54
Teresa F. Lunt
.
Access control policies: Some unanswered questions
55
--
58
Chris J. Mitchell
,
Dave Rush
,
Michael Walker
.
A remark on hash functions for message authentication
59
--
66
J. Feuerlicht
,
P. Grattan
.
The role of classification of information in controlling data proliferation in end-user personal computer environment
74
--
82
Esther H. Highland
.
Abstracts of recent articles and literature