Journal: Computers & Security

Volume 8, Issue 1

2 -- 0Harold Joseph Highland. From the editor
3 -- 13Harold Joseph Highland. Random bits & bytes
15 -- 21Rolf Moulton, Robert P. Bigelow. Protecting ownership of proprietary information
23 -- 24Lance J. Hoffman. Risk analysis and computer security: Towards a theory at last
25 -- 27Bernard P. Zajac Jr.. Legal options to computer viruses
29 -- 31Jack Bologna. The one minute fraud auditor
35 -- 41Winfried Gleissner. A mathematical theory for the spread of computer viruses
43 -- 54Teresa F. Lunt. Access control policies: Some unanswered questions
55 -- 58Chris J. Mitchell, Dave Rush, Michael Walker. A remark on hash functions for message authentication
59 -- 66J. Feuerlicht, P. Grattan. The role of classification of information in controlling data proliferation in end-user personal computer environment
74 -- 82Esther H. Highland. Abstracts of recent articles and literature