Journal: Computers & Security

Volume 9, Issue 1

4 -- 11Harold Joseph Highland. Random bits & bytes
13 -- 24Charles Cresson Wood. Principles of secure information systems design
25 -- 31Bernard P. Zajac Jr.. Computer viruses: Can they be prevented?
33 -- 35Charlotte Klopp. Software vendors capitalize on security needs
41 -- 44Paul Evans, Tina Monk. Conference report: COMPSEC 89
45 -- 49John M. Carroll. Conference report: 2300 brave virus threat to attend national security conference
53 -- 58Peter Smulders. The threat of information theft by reception of electromagnetic radiation from RS-232 cables
59 -- 66Lindsay C. J. Mercer. Tailor-made auditing of information systems for the detection of fraud
67 -- 75John Burns 0003, Chris J. Mitchell. A security scheme for resource sharing over a network
77 -- 84Raju Ramaswamy. A key management algorithm for secure communication in open systems interconnection architecture