researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
10
, Issue
8
690
--
699
Harold Joseph Highland
.
Random bits & bytes
701
--
710
Charles Preston
.
Creating a corporate virus plan
711
--
722
Paul Lynch
.
Beyond RACF: Extending user authentication controls
727
--
747
Bhavani M. Thuraisingham
.
Multilevel security issues in distributed database management systems II
749
--
764
Richard Baskerville
.
Risk analysis as a source of professional knowledge
765
--
776
Gnanesh Coomaraswamy
,
Srikanta P. R. Kumar
,
Michel E. Marhic
.
Fiber-optic LAN/WAN systems to support confidential communication
Volume
10
, Issue
7
586
--
600
Harold Joseph Highland
.
Random bits & bytes
612
--
625
Gerhard Steinke
.
Design aspects of access control in a knowledge base system
626
--
636
Viiveke Fåk
.
Computer verification of human users identity: A theoretical model and some evaluation criteria
639
--
652
Josep Domingo-Ferrer
.
Algorithm- sequenced access control
653
--
660
Dalenca Pottas
,
Sebastiaan H. von Solms
.
A computerized management reporting aid for a mainframe security system
661
--
669
M. L. Goyal
,
G. V. Singh
.
Access control in distributed heterogeneous database management systems
Volume
10
, Issue
6
486
--
495
Harold Joseph Highland
.
Random bits & bytes
497
--
514
Paul Rosenthal
,
Barry Himel
.
Business resumption planning: Exercising your emergency response teams
515
--
523
Shari Lawrence Pfleeger
.
A framework for security requirements
524
--
532
Charles Cresson Wood
.
Burning computer security, privacy, and freedom issues
535
--
539
Frederick B. Cohen
.
A note on high-integrity PC bootstrapping
541
--
551
Frederick B. Cohen
.
A DOS-based ::::POset:::: implementation
553
--
560
Hannu Nurmi
,
Arto Salomaa
,
Lila Santean
.
Secret ballot elections in computer networks
Volume
10
, Issue
5
384
--
397
Harold Joseph Highland
.
Random bits & bytes
399
--
404
Charles Cresson Wood
.
Using information security to achieve competitive advantage
405
--
409
Belden Menkus
.
Hackers : Know the adversary
413
--
427
Ravi S. Sandhu
,
Sushil Jajodia
.
Integrity principles and mechanisms in database management systems
429
--
441
Jan Kruys
.
Progress in secure distributed systems
Volume
10
, Issue
4
293
--
297
Belden Menkus
.
Control is fundamental to successful information security
303
--
307
Jack Bologna
.
A framework for the ethical analysis of information technologies
309
--
324
Ronald Paans
.
With MVS/ESA security labels towards B1
325
--
327
Paul Evans
.
Computer fraud - The situation, detection and training
331
--
344
Gerald V. Post
,
Karen-Ann Kievit
.
Accessibility vs. security: A look at the demand for computer security
345
--
357
Avi Rushinek
,
Sara F. Rushinek
.
Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security
359
--
370
Christof Schramm
.
Computing centers undermine MVS security
Volume
10
, Issue
3
184
--
188
Harold Joseph Highland
.
A non-mathematical view of encryption
189
--
190
Harold Joseph Highland
.
Evaluating an encryption package
190
--
191
Harold Joseph Highland
.
Computers under attack
191
--
195
Harold Joseph Highland
.
Microcomputer utilities
195
--
198
Harold Joseph Highland
.
NTIS volumes of interest
199
--
203
Belden Menkus
.
How to begin dealing with computer security
205
--
212
Simon Banks
.
Understanding IBM s CICS systems to improve security
213
--
216
Stewart Kowalski
.
The ABCs and Es of national computer security policies
217
--
227
Stewart Kowalski
.
Cybernetic analysis of national computer security
228
--
235
Stewart Kowalski
.
Cybernetic analysis of the 12th U.S. National Computer Security Conference
239
--
250
Frederick B. Cohen
.
A cost analysis of typical computer viruses and defenses
251
--
261
Ronald Paans
,
Hans de Lange
.
Auditing the SNA/SNI environment
263
--
267
Denis Laurichesse
,
Laurent Blain
.
Optimized implementation of RSA cryptosystem
271
--
275
R. J. Allen
.
Trusted ORACLE - multilevel secure data management for military computing
Volume
10
, Issue
2
92
--
100
Harold Joseph Highland
.
Random bits & bytes
101
--
110
Karl Rihaczek
.
The harmonized ITSEC evaluation criteria
111
--
114
Harold W. Thimbleby
.
Can viruses ever be useful?
117
--
127
Jim Press
.
Secure transfer of identity and privilege attributes in an open systems environment
129
--
139
J. K. Jan
,
Chin-Chen Chang
,
S. J. Wang
.
A dynamic key-lock-pair access control scheme
141
--
159
Dimitris Gritzalis
,
A. Tomaras
,
Sokratis K. Katsikas
,
J. Keklikoglou
.
Data security in medical information systems: The Greek case
Volume
10
, Issue
1
4
--
16
Harold Joseph Highland
.
Random bits & bytes
17
--
19
Bernard Robertson
.
Electronic mail - Is is safe to use?
25
--
33
Kazue Tanaka
,
Eiji Okamoto
.
Key distribution system for mail systems using ID-related information directory
37
--
40
Chris J. Mitchell
,
Vijay Varadharajan
.
Modified forms of cipher block chaining
41
--
49
Claude Laferriere
.
Predicate based polyinstantiation in multi-level secure DBMS
51
--
68
Vijay Varadharajan
,
Stewart Black
.
Multilevel security in a distributed object-oriented system
69
--
72
J. Carr
.
Electronic data interchange - security risk or not?