Journal: Computers & Security

Volume 10, Issue 8

690 -- 699Harold Joseph Highland. Random bits & bytes
701 -- 710Charles Preston. Creating a corporate virus plan
711 -- 722Paul Lynch. Beyond RACF: Extending user authentication controls
727 -- 747Bhavani M. Thuraisingham. Multilevel security issues in distributed database management systems II
749 -- 764Richard Baskerville. Risk analysis as a source of professional knowledge
765 -- 776Gnanesh Coomaraswamy, Srikanta P. R. Kumar, Michel E. Marhic. Fiber-optic LAN/WAN systems to support confidential communication

Volume 10, Issue 7

586 -- 600Harold Joseph Highland. Random bits & bytes
612 -- 625Gerhard Steinke. Design aspects of access control in a knowledge base system
626 -- 636Viiveke Fåk. Computer verification of human users identity: A theoretical model and some evaluation criteria
639 -- 652Josep Domingo-Ferrer. Algorithm- sequenced access control
653 -- 660Dalenca Pottas, Sebastiaan H. von Solms. A computerized management reporting aid for a mainframe security system
661 -- 669M. L. Goyal, G. V. Singh. Access control in distributed heterogeneous database management systems

Volume 10, Issue 6

486 -- 495Harold Joseph Highland. Random bits & bytes
497 -- 514Paul Rosenthal, Barry Himel. Business resumption planning: Exercising your emergency response teams
515 -- 523Shari Lawrence Pfleeger. A framework for security requirements
524 -- 532Charles Cresson Wood. Burning computer security, privacy, and freedom issues
535 -- 539Frederick B. Cohen. A note on high-integrity PC bootstrapping
541 -- 551Frederick B. Cohen. A DOS-based ::::POset:::: implementation
553 -- 560Hannu Nurmi, Arto Salomaa, Lila Santean. Secret ballot elections in computer networks

Volume 10, Issue 5

384 -- 397Harold Joseph Highland. Random bits & bytes
399 -- 404Charles Cresson Wood. Using information security to achieve competitive advantage
405 -- 409Belden Menkus. Hackers : Know the adversary
413 -- 427Ravi S. Sandhu, Sushil Jajodia. Integrity principles and mechanisms in database management systems
429 -- 441Jan Kruys. Progress in secure distributed systems

Volume 10, Issue 4

293 -- 297Belden Menkus. Control is fundamental to successful information security
303 -- 307Jack Bologna. A framework for the ethical analysis of information technologies
309 -- 324Ronald Paans. With MVS/ESA security labels towards B1
325 -- 327Paul Evans. Computer fraud - The situation, detection and training
331 -- 344Gerald V. Post, Karen-Ann Kievit. Accessibility vs. security: A look at the demand for computer security
345 -- 357Avi Rushinek, Sara F. Rushinek. Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security
359 -- 370Christof Schramm. Computing centers undermine MVS security

Volume 10, Issue 3

184 -- 188Harold Joseph Highland. A non-mathematical view of encryption
189 -- 190Harold Joseph Highland. Evaluating an encryption package
190 -- 191Harold Joseph Highland. Computers under attack
191 -- 195Harold Joseph Highland. Microcomputer utilities
195 -- 198Harold Joseph Highland. NTIS volumes of interest
199 -- 203Belden Menkus. How to begin dealing with computer security
205 -- 212Simon Banks. Understanding IBM s CICS systems to improve security
213 -- 216Stewart Kowalski. The ABCs and Es of national computer security policies
217 -- 227Stewart Kowalski. Cybernetic analysis of national computer security
228 -- 235Stewart Kowalski. Cybernetic analysis of the 12th U.S. National Computer Security Conference
239 -- 250Frederick B. Cohen. A cost analysis of typical computer viruses and defenses
251 -- 261Ronald Paans, Hans de Lange. Auditing the SNA/SNI environment
263 -- 267Denis Laurichesse, Laurent Blain. Optimized implementation of RSA cryptosystem
271 -- 275R. J. Allen. Trusted ORACLE - multilevel secure data management for military computing

Volume 10, Issue 2

92 -- 100Harold Joseph Highland. Random bits & bytes
101 -- 110Karl Rihaczek. The harmonized ITSEC evaluation criteria
111 -- 114Harold W. Thimbleby. Can viruses ever be useful?
117 -- 127Jim Press. Secure transfer of identity and privilege attributes in an open systems environment
129 -- 139J. K. Jan, Chin-Chen Chang, S. J. Wang. A dynamic key-lock-pair access control scheme
141 -- 159Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou. Data security in medical information systems: The Greek case

Volume 10, Issue 1

4 -- 16Harold Joseph Highland. Random bits & bytes
17 -- 19Bernard Robertson. Electronic mail - Is is safe to use?
25 -- 33Kazue Tanaka, Eiji Okamoto. Key distribution system for mail systems using ID-related information directory
37 -- 40Chris J. Mitchell, Vijay Varadharajan. Modified forms of cipher block chaining
41 -- 49Claude Laferriere. Predicate based polyinstantiation in multi-level secure DBMS
51 -- 68Vijay Varadharajan, Stewart Black. Multilevel security in a distributed object-oriented system
69 -- 72J. Carr. Electronic data interchange - security risk or not?