researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
11
, Issue
8
682
--
694
Harold Joseph Highland
.
Random bits & bytes
695
--
698
Todd Whiting
.
Understanding VAX/VMS security
699
--
702
George Black
.
Update on open systems security
703
--
706
Belden Menkus
.
Re-examining the Data Encryption Standard
707
--
710
Judith King
.
X.400 security
711
--
714
Gary Hardy
.
Case study: Closing windows against intruders
733
--
745
Dimitris Gritzalis
,
Sokratis K. Katsikas
,
Stefanos Gritzalis
.
A zero knowledge probabilistic login protocol
747
--
752
Lein Harn
,
Hung-Yu Lin
,
Shoubao Yang
.
A software authentication system for information integrity
753
--
763
Ravi S. Sandhu
.
Lattice-based enforcement of Chinese Walls
Volume
11
, Issue
7
592
--
601
Harold Joseph Highland
.
Random bits & bytes
602
--
606
Alan Solomon
.
The virus authors strike back
607
--
619
Jon David
.
LAN security standards
620
--
622
Michael J. Cerullo
,
R. Steve McDuffie
.
Computer contingency plans and the auditors: A survey of businesses affected by Hurricane Hugo
641
--
652
Frederick B. Cohen
.
A formal definition of computer worms and some related results
653
--
659
Sead Muftic
,
Edina Hatunic
.
CISS: Generalized security libraries
661
--
674
Bhavani M. Thuraisingham
,
Harvey H. Rubinovitz
.
Multilevel security issues in distributed database management systems - III
Volume
11
, Issue
6
498
--
507
Harold Joseph Highland
.
Random bits & bytes
518
--
524
John Robinson
.
Computer security evaluation: Developments in the European ITSEC programme
525
--
528
Belden Menkus
.
Understanding EDI security issues
547
--
562
Ravi S. Sandhu
,
Sushil Jajodia
.
Eliminating polyinstantiation securely
563
--
579
Frederick B. Cohen
.
Defense-in-depth against computer viruses
581
--
583
Sebastiaan H. von Solms
,
David Naccache
.
On blind signatures and perfect crimes
Volume
11
, Issue
5
390
--
406
Harold Joseph Highland
.
Random bits & bytes
412
--
416
Geoff Norman
.
PC security issues
417
--
420
Belden Menkus
.
The lessons of the Great Chicago flood of 1992
421
--
426
David L. Lathrop
.
Security aspects of wireless local area networks
427
--
437
Fritz Bauspieß
,
Frank Damm
.
Requirements for cryptographic hash functions
445
--
461
Helen A. Bergen
,
James M. Hogan
.
Data security in a fixed-model arithmetic coding compression algorithm
463
--
479
William J. Caelli
,
Anthony W. Rhodes
,
N. C. Russell
.
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC
Volume
11
, Issue
4
294
--
306
Harold Joseph Highland
.
Random bits & bytes
307
--
313
R. Dixon
,
C. Marston
,
P. Collier
.
A report on the joint CIMA and IIA computer fraud survey
327
--
340
.
Information security administration model: A management model to help identify the best practices of the administration function within the security group
347
--
355
Gunar E. Liepins
,
H. S. Vaccaro
.
Intrusion detection: Its role and validation
357
--
369
Jie Wu
,
Eduardo B. Fernández
,
Ruiguang Zhang
.
Some extensions to the lattice model for computer security
Volume
11
, Issue
3
200
--
209
Harold Joseph Highland
.
Random bits & bytes
211
--
215
Belden Menkus
.
Concerns in computer security
217
--
226
Bernard P. Zajac Jr.
.
Cost-effectiveness of anti-viral software
227
--
232
Harold Joseph Highland
.
The security impact of networks, telecommunications, and office automation
233
--
236
Wayne Madsen
.
Government-sponsored computer warfare and sabotage
237
--
244
Ian G. Graham
,
St. H. Wieten
.
The PC as a secure network workstation
253
--
258
George I. Davida
,
Yvo Desmedt
.
Passports and visas versus IDs
259
--
271
Martin S. Olivier
,
Sebastiaan H. von Solms
.
Building a secure database using self-protecting objects
273
--
278
Eugene H. Spafford
.
OPUS: Preventing weak password choices
Volume
11
, Issue
2
110
--
120
Harold Joseph Highland
.
Random bits & bytes
121
--
127
Belden Menkus
.
Introduction to computer security
128
--
133
Robin L. Sherman
.
Biometrics futures
149
--
161
Dimitris Gritzalis
,
Sokratis K. Katsikas
,
J. Keklikoglou
,
A. Tomaras
.
Determining access rights for medical information systems
163
--
172
P. Venkat Rangan
.
An axiomatic theory of trust in secure communication protocols
Volume
11
, Issue
1
4
--
15
Harold Joseph Highland
.
Random bits & bytes
19
--
23
Belden Menkus
.
A high rise building fire case study
24
--
28
Robin L. Sherman
.
Distributed systems security
29
--
34
Bernard P. Zajac Jr.
.
Computer viral risks - how bad is the threat?
41
--
56
Teresa F. Lunt
.
Security in database systems: A research perspective
57
--
73
Atika Laribi
,
Dennis G. Kafura
.
A protection model incorporating both authorization and constraints
75
--
89
Dennis Longley
,
S. Rigby
.
An automatic search for security flaws in key management schemes