Journal: Computers & Security

Volume 12, Issue 8

698 -- 709Harold Joseph Highland. Random bits & bytes
710 -- 715Peter Fagan. Organizational issues in IT security
716 -- 729Gary Hardy. Commercial accreditation of information security
730 -- 734Harold Joseph Highland. 16th national computer security conference
753 -- 764Dieter Gollmann, Thomas Beth, Frank Damm. Authentication services in distributed systems
765 -- 774Jon Ølnes. EDIFACT security made simple - the EDIMED approach
781 -- 787Caroline Allinson, Helen Bergen, Edward P. Dawson. Message collision in block ciphers with message authentication

Volume 12, Issue 7

612 -- 622Harold Joseph Highland. Random bits & bytes
623 -- 626Martin Plant. Getting management buy-in to IT security
627 -- 628Edwin B. Heinlein. I worked with Murphy
629 -- 633Brian S. Collins, Steve Mathews. Securing your business process
634 -- 639Harold Joseph Highland. A view of information security tomorrow
640 -- 645William J. Caelli, Ian G. Graham, Luke O Connor. Cryptographic Application Programming Interfaces (APIs)
657 -- 662Mohammad S. Obaidat. A methodology for improving computer access security
663 -- 678Charles Cresson Wood. Principles of secure information systems design with groupware examples
679 -- 689Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams. Report of an integrity research study group

Volume 12, Issue 6

518 -- 526Harold Joseph Highland. Random bits & bytes
527 -- 535Charles Cresson Wood. Duress terminations and information security
536 -- 541Michael F. Kensey. Computer viruses - Towards better solutions
542 -- 549Selwyn Russell. Paradigms for verification of authorization at source of electronic documents in an integrated environment
550 -- 555Harold Joseph Highland. IFIP/Sec 93 conference report
565 -- 584Frederick B. Cohen. Operating system protection through program evolution
585 -- 595Eugene H. Spafford, Stephen A. Weeber. Software forensics: Can we track code to its authors?
597 -- 603Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst. A comparative framework for risk analysis methods

Volume 12, Issue 5

424 -- 433Harold Joseph Highland. Random bits & bytes
435 -- 436Edwin B. Heinlein. World Trade Center - A retrospective
437 -- 446David K. Black. The Digital Signature Standard: Overview and current status
469 -- 475Frans Labuschagne, Jan Roos. Data security in X.25 networks
477 -- 500Andreas Pfitzmann, Ralf Aßmann. More efficient software implementations of (generalized) DES
501 -- 510J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda. Encryption and error correction codes for reliable file storage

Volume 12, Issue 4

334 -- 337Edwin B. Heinlein. Recovery management
338 -- 340John Meyer. The 1993 IFIP Kristian Beckman Award
341 -- 361Manfred Reitenspieß. Open system security standards
379 -- 388Christof Schramm. Added-on security for MVS: weaknesses and measures
389 -- 404James M. Slack, Elizabeth A. Unger. Integrity in object-oriented database systems
405 -- 418Teresa F. Lunt. A survey of intrusion detection techniques

Volume 12, Issue 3

216 -- 224Harold Joseph Highland. Random bits & bytes
225 -- 229Geoff Norman. Disaster recovery after downsizing
235 -- 248Judith Hochberg, Kathleen A. Jackson, Cathy A. Stallings, J. F. McClary, David H. DuBois, Josephine Ford. NADIR: An automated system for detecting network intrusion and misuse
249 -- 253Harold Joseph Highland. Conference report
275 -- 283Jeffrey M. Voas, Jeffery E. Payne, Frederick B. Cohen. A model for detecting the existence of software corruption in real time
285 -- 303Ravi S. Sandhu, Gurpreet S. Suri. A distributed capability-based architecture for the transform model
305 -- 314P. Venkat Rangan. The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol

Volume 12, Issue 2

106 -- 116Harold Joseph Highland. Random bits & bytes
117 -- 122Stanley H. Stahl. Information security in workstation environments
123 -- 127Robert A. Clyde. DECnet security (Not necessarily an oxymoron)
128 -- 133David Moseley. Public key management for X.25 network security
157 -- 167Helen A. Bergen, James M. Hogan. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
169 -- 189John A. Fitch III, Lance J. Hoffman. A shortest path network security model
191 -- 197Mary C. Jones, Kirk P. Arnett, Jeung-tai Eddie Tang, Nian-Shin Chen. Perceptions of computer viruses: a cross-cultural assessment

Volume 12, Issue 1

4 -- 14Harold Joseph Highland. Random bits & bytes
28 -- 31Steve Donovan. Security of PCs in a distributed environment
51 -- 60Charles Cresson Wood, William W. Banks Jr.. Human error: an overlooked but significant information security problem
61 -- 77Thomas A. Longstaff, E. Eugene Schultz. Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
79 -- 97Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger. A survey of security issues in office computation and the application of secure computing models to office systems