Journal: Computers & Security

Volume 11, Issue 8

682 -- 694Harold Joseph Highland. Random bits & bytes
695 -- 698Todd Whiting. Understanding VAX/VMS security
699 -- 702George Black. Update on open systems security
703 -- 706Belden Menkus. Re-examining the Data Encryption Standard
707 -- 710Judith King. X.400 security
711 -- 714Gary Hardy. Case study: Closing windows against intruders
733 -- 745Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis. A zero knowledge probabilistic login protocol
747 -- 752Lein Harn, Hung-Yu Lin, Shoubao Yang. A software authentication system for information integrity
753 -- 763Ravi S. Sandhu. Lattice-based enforcement of Chinese Walls

Volume 11, Issue 7

592 -- 601Harold Joseph Highland. Random bits & bytes
602 -- 606Alan Solomon. The virus authors strike back
607 -- 619Jon David. LAN security standards
620 -- 622Michael J. Cerullo, R. Steve McDuffie. Computer contingency plans and the auditors: A survey of businesses affected by Hurricane Hugo
641 -- 652Frederick B. Cohen. A formal definition of computer worms and some related results
653 -- 659Sead Muftic, Edina Hatunic. CISS: Generalized security libraries
661 -- 674Bhavani M. Thuraisingham, Harvey H. Rubinovitz. Multilevel security issues in distributed database management systems - III

Volume 11, Issue 6

498 -- 507Harold Joseph Highland. Random bits & bytes
518 -- 524John Robinson. Computer security evaluation: Developments in the European ITSEC programme
525 -- 528Belden Menkus. Understanding EDI security issues
547 -- 562Ravi S. Sandhu, Sushil Jajodia. Eliminating polyinstantiation securely
563 -- 579Frederick B. Cohen. Defense-in-depth against computer viruses
581 -- 583Sebastiaan H. von Solms, David Naccache. On blind signatures and perfect crimes

Volume 11, Issue 5

390 -- 406Harold Joseph Highland. Random bits & bytes
412 -- 416Geoff Norman. PC security issues
417 -- 420Belden Menkus. The lessons of the Great Chicago flood of 1992
421 -- 426David L. Lathrop. Security aspects of wireless local area networks
427 -- 437Fritz Bauspieß, Frank Damm. Requirements for cryptographic hash functions
445 -- 461Helen A. Bergen, James M. Hogan. Data security in a fixed-model arithmetic coding compression algorithm
463 -- 479William J. Caelli, Anthony W. Rhodes, N. C. Russell. An evaluation of HP-UX (UNIX) for database protection using the European ITSEC

Volume 11, Issue 4

294 -- 306Harold Joseph Highland. Random bits & bytes
307 -- 313R. Dixon, C. Marston, P. Collier. A report on the joint CIMA and IIA computer fraud survey
327 -- 340. Information security administration model: A management model to help identify the best practices of the administration function within the security group
347 -- 355Gunar E. Liepins, H. S. Vaccaro. Intrusion detection: Its role and validation
357 -- 369Jie Wu, Eduardo B. Fernández, Ruiguang Zhang. Some extensions to the lattice model for computer security

Volume 11, Issue 3

200 -- 209Harold Joseph Highland. Random bits & bytes
211 -- 215Belden Menkus. Concerns in computer security
217 -- 226Bernard P. Zajac Jr.. Cost-effectiveness of anti-viral software
227 -- 232Harold Joseph Highland. The security impact of networks, telecommunications, and office automation
233 -- 236Wayne Madsen. Government-sponsored computer warfare and sabotage
237 -- 244Ian G. Graham, St. H. Wieten. The PC as a secure network workstation
253 -- 258George I. Davida, Yvo Desmedt. Passports and visas versus IDs
259 -- 271Martin S. Olivier, Sebastiaan H. von Solms. Building a secure database using self-protecting objects
273 -- 278Eugene H. Spafford. OPUS: Preventing weak password choices

Volume 11, Issue 2

110 -- 120Harold Joseph Highland. Random bits & bytes
121 -- 127Belden Menkus. Introduction to computer security
128 -- 133Robin L. Sherman. Biometrics futures
149 -- 161Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras. Determining access rights for medical information systems
163 -- 172P. Venkat Rangan. An axiomatic theory of trust in secure communication protocols

Volume 11, Issue 1

4 -- 15Harold Joseph Highland. Random bits & bytes
19 -- 23Belden Menkus. A high rise building fire case study
24 -- 28Robin L. Sherman. Distributed systems security
29 -- 34Bernard P. Zajac Jr.. Computer viral risks - how bad is the threat?
41 -- 56Teresa F. Lunt. Security in database systems: A research perspective
57 -- 73Atika Laribi, Dennis G. Kafura. A protection model incorporating both authorization and constraints
75 -- 89Dennis Longley, S. Rigby. An automatic search for security flaws in key management schemes