Journal: Computers & Security

Volume 1, Issue 3

201 -- 209William Hugh Murray. Security procedures for program libraries
210 -- 215James K. Shaw, Stuart W. Katzke. An executive guide to ADP contingency planning
216 -- 225Leslie D. Ball, Gail Dentch, Mary Emerson, Martha Lewis, Susan McWhorter, Frank Turgeon. Disaster recovery services
226 -- 230Christer Lindén, Hans Block. Sealing electronic money in Sweden
231 -- 232Susan K. Reed, Dennis K. Branstad. Reflections on ten years of computer security
242 -- 0Harold Joseph Highland. Editor's note
243 -- 244Michael Willett. Guest editorial
245 -- 248David Kahn. The grand lines of cryptology's development
249 -- 254R. Creighton Buck. The public cryptography study group
255 -- 260Dennis K. Branstad, Miles E. Smid. Integrity and security standards based on cryptography
261 -- 267Subodh K. Banerjee. High speed implementation of DES
268 -- 274Brian P. Schanning. Applying public key distribution to local area networks
275 -- 289N. S. Jayant. Analog scramblers for speech privacy
290 -- 291. Management guide to computer security : J.P. Talbot: New York: John Wiley and Sons, 1981. xi + 180 pp. $29.95
291 -- 292. Multi-national computer systems: An introduction to transnational data flow and data regulation : Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. $16.95

Volume 1, Issue 2

95 -- 0Harold Joseph Highland. Editorial
99 -- 112Robert H. Courtney Jr.. A systematic approach to data security
113 -- 122Rolf Blom, Jan-Olof Brüer, Viiveke Fåk, S. Ingvar Åkersten. On security measures in distributed computer systems
123 -- 138John M. Carroll. The control of computer-based fraud
139 -- 145Charles Cresson Wood. Policies for deterring computer abuse
146 -- 151Rolf Moulton. A multidisciplinary approach to the investigation of computer abuse incidents
152 -- 163William Neugent. Teaching computer security: A course outline
164 -- 176Esther Harris Highland, Harold Joseph Highland. A guide to NBS computer security literature
177 -- 186Michael Willett. Cryptography old and new
191 -- 0Harold Joseph Highland. Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95
191 -- 192Harold Joseph Highland. Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95
192 -- 0Esther H. Highland. System security standard for electronic data processing : Rolf Moulton New York: The city of New York, 1981. $7.50

Volume 1, Issue 1

1 -- 2Harold Joseph Highland. Editorial
9 -- 16Samantha Fordyce. Computer security: A current assessment
17 -- 26William E. Perry. Developing a computer security and control strategy
27 -- 33Louis C. Guillou, B. Lorig. Cryptography and teleinformatics
34 -- 40Stanley Friedman. Contingency and disaster planning
41 -- 53Jay Bloombecker. International computer crime: Where terrorism and transborder data flow meet
54 -- 56Sigmund N. Porter. A password extension for improved human factors
57 -- 64Stanley A. Kurzban. A selective, briefly annotated bibliography of works on data security and privacy
65 -- 71Charles Cresson Wood. Future applications of cryptography
72 -- 79Michael Willett. A tutorial on public key cryptography
80 -- 83Paul S. Henry. Fast decryption algorithm for the knapsack cipher