researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
12
, Issue
8
698
--
709
Harold Joseph Highland
.
Random bits & bytes
710
--
715
Peter Fagan
.
Organizational issues in IT security
716
--
729
Gary Hardy
.
Commercial accreditation of information security
730
--
734
Harold Joseph Highland
.
16th national computer security conference
753
--
764
Dieter Gollmann
,
Thomas Beth
,
Frank Damm
.
Authentication services in distributed systems
765
--
774
Jon Ølnes
.
EDIFACT security made simple - the EDIMED approach
781
--
787
Caroline Allinson
,
Helen Bergen
,
Edward P. Dawson
.
Message collision in block ciphers with message authentication
Volume
12
, Issue
7
612
--
622
Harold Joseph Highland
.
Random bits & bytes
623
--
626
Martin Plant
.
Getting management buy-in to IT security
627
--
628
Edwin B. Heinlein
.
I worked with Murphy
629
--
633
Brian S. Collins
,
Steve Mathews
.
Securing your business process
634
--
639
Harold Joseph Highland
.
A view of information security tomorrow
640
--
645
William J. Caelli
,
Ian G. Graham
,
Luke O Connor
.
Cryptographic Application Programming Interfaces (APIs)
657
--
662
Mohammad S. Obaidat
.
A methodology for improving computer access security
663
--
678
Charles Cresson Wood
.
Principles of secure information systems design with groupware examples
679
--
689
Marshall D. Abrams
,
Edward Amoroso
,
Leonard J. LaPadula
,
Teresa F. Lunt
,
James G. Williams
.
Report of an integrity research study group
Volume
12
, Issue
6
518
--
526
Harold Joseph Highland
.
Random bits & bytes
527
--
535
Charles Cresson Wood
.
Duress terminations and information security
536
--
541
Michael F. Kensey
.
Computer viruses - Towards better solutions
542
--
549
Selwyn Russell
.
Paradigms for verification of authorization at source of electronic documents in an integrated environment
550
--
555
Harold Joseph Highland
.
IFIP/Sec 93 conference report
565
--
584
Frederick B. Cohen
.
Operating system protection through program evolution
585
--
595
Eugene H. Spafford
,
Stephen A. Weeber
.
Software forensics: Can we track code to its authors?
597
--
603
Jan H. P. Eloff
,
Les Labuschagne
,
Karin P. Badenhorst
.
A comparative framework for risk analysis methods
Volume
12
, Issue
5
424
--
433
Harold Joseph Highland
.
Random bits & bytes
435
--
436
Edwin B. Heinlein
.
World Trade Center - A retrospective
437
--
446
David K. Black
.
The Digital Signature Standard: Overview and current status
469
--
475
Frans Labuschagne
,
Jan Roos
.
Data security in X.25 networks
477
--
500
Andreas Pfitzmann
,
Ralf Aßmann
.
More efficient software implementations of (generalized) DES
501
--
510
J. Fernández-González
,
Gordon B. Agnew
,
Arturo Ribagorda
.
Encryption and error correction codes for reliable file storage
Volume
12
, Issue
4
334
--
337
Edwin B. Heinlein
.
Recovery management
338
--
340
John Meyer
.
The 1993 IFIP Kristian Beckman Award
341
--
361
Manfred Reitenspieß
.
Open system security standards
379
--
388
Christof Schramm
.
Added-on security for MVS: weaknesses and measures
389
--
404
James M. Slack
,
Elizabeth A. Unger
.
Integrity in object-oriented database systems
405
--
418
Teresa F. Lunt
.
A survey of intrusion detection techniques
Volume
12
, Issue
3
216
--
224
Harold Joseph Highland
.
Random bits & bytes
225
--
229
Geoff Norman
.
Disaster recovery after downsizing
235
--
248
Judith Hochberg
,
Kathleen A. Jackson
,
Cathy A. Stallings
,
J. F. McClary
,
David H. DuBois
,
Josephine Ford
.
NADIR: An automated system for detecting network intrusion and misuse
249
--
253
Harold Joseph Highland
.
Conference report
275
--
283
Jeffrey M. Voas
,
Jeffery E. Payne
,
Frederick B. Cohen
.
A model for detecting the existence of software corruption in real time
285
--
303
Ravi S. Sandhu
,
Gurpreet S. Suri
.
A distributed capability-based architecture for the transform model
305
--
314
P. Venkat Rangan
.
The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol
Volume
12
, Issue
2
106
--
116
Harold Joseph Highland
.
Random bits & bytes
117
--
122
Stanley H. Stahl
.
Information security in workstation environments
123
--
127
Robert A. Clyde
.
DECnet security (Not necessarily an oxymoron)
128
--
133
David Moseley
.
Public key management for X.25 network security
157
--
167
Helen A. Bergen
,
James M. Hogan
.
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
169
--
189
John A. Fitch III
,
Lance J. Hoffman
.
A shortest path network security model
191
--
197
Mary C. Jones
,
Kirk P. Arnett
,
Jeung-tai Eddie Tang
,
Nian-Shin Chen
.
Perceptions of computer viruses: a cross-cultural assessment
Volume
12
, Issue
1
4
--
14
Harold Joseph Highland
.
Random bits & bytes
28
--
31
Steve Donovan
.
Security of PCs in a distributed environment
51
--
60
Charles Cresson Wood
,
William W. Banks Jr.
.
Human error: an overlooked but significant information security problem
61
--
77
Thomas A. Longstaff
,
E. Eugene Schultz
.
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
79
--
97
Rayford B. Vaughn
,
Hossein Saiedian
,
Elizabeth A. Unger
.
A survey of security issues in office computation and the application of secure computing models to office systems