Journal: Computers & Security

Volume 13, Issue 8

622 -- 627Harold Joseph Highland. Random bits & bytes
628 -- 636Jon Ølnes. Development of security policies
637 -- 645Ken Lindup. The cyberpunk age
647 -- 650Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe. Security evaluation in information technology standards
661 -- 671Imtiaz Mohammed, David M. Dilts. Design for dynamic user-role-based security
673 -- 680Sebastiaan H. von Solms, Isak van der Merwe. The management of computer security profiles using a role-oriented approach
681 -- 686Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu. Access control with binary keys
687 -- 697Helen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli. A computer package for measuring the strength of encryption algorithms

Volume 13, Issue 7

540 -- 546Harold Joseph Highland. Random bits & bytes
558 -- 563Peter Sommer. Industrial espionage: Analysing the risk
573 -- 580Thomas Hardjono, Yuliang Zheng, Jennifer Seberry. Database authentication revisited
581 -- 585Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang. Authentication and protection of public keys
587 -- 599Jeffrey Picciotto, Richard D. Graubart. Extended labeling policies for enhanced application support
601 -- 610Horng-Twu Liaw. A dynamic cryptographic key generation and information broadcasting scheme in information systems
611 -- 613Mark Looi, William J. Caelli. A note on supplying a trusted clock via a secure device

Volume 13, Issue 6

458 -- 465Harold Joseph Highland. Random bits & bytes
467 -- 471Thomas Lillywhite. IT security standards and the adoption of a benchmarking approach
473 -- 480Ian M. Symonds. Security in distributed and client/server systems - A management view
481 -- 483Edwin B. Heinlein. 17th National Computer Security Conference - An opinion
495 -- 508Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis. Intrusion detection: Approach and performance issues of the SECURENET system
509 -- 525Bhavani M. Thuraisingham. Security issues for federated database systems
527 -- 531Peter B. Ladkin, Harold W. Thimbleby. Comments on a paper by Voas, Payne and Cohen: A model for detecting the existence of software corruption in real time

Volume 13, Issue 5

372 -- 378Harold Joseph Highland. Random bits & bytes
379 -- 384Leon Strous. Security evaluation criteria
385 -- 391Michael J. Ganley. Digital signatures and their uses
392 -- 400Bernard P. Zajac Jr.. Cost effectiveness of anti-viral scanners
411 -- 435Karin P. Badenhorst, Jan H. P. Eloff. TOPM: a formal approach to the optimization of information technology risk management
437 -- 450Eike Born, Helmut G. Stiegler. Discretionary access control by means of usage conditions

Volume 13, Issue 4

278 -- 286Harold Joseph Highland. Random bits & bytes
287 -- 293Karl Rihaczek. Data interchange and legal security - signature surrogates
295 -- 301William List, Rob Melville. Integrity in information systems - Executive summary
317 -- 333Edo Roos Lindgreen, I. S. Herschberg. On the validity of the Bell-La Padula model
335 -- 347Dennis Longley, S. Vasudevan. Effect of key generators on the automatic search for flaws in key management schemes
349 -- 364D. N. J. Mostert, Sebastiaan H. von Solms. A methodology to include computer security, safety and resilience requirements as part of the user requirement

Volume 13, Issue 3

192 -- 205Harold Joseph Highland. Random bits & bytes
206 -- 208Robert H. Courtney, Willis H. Ware. What do we mean by integrity?
209 -- 215Charles Cresson Wood. Fifty ways to secure dial-up connections
231 -- 253Shivraj Kanungo. Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework
255 -- 261Chin-Chen Chang, J. K. Jan, Daniel J. Buehrer. A scheme to determine the relationship between two users in a hierarchy

Volume 13, Issue 2

98 -- 106Harold Joseph Highland. Random bits & bytes
107 -- 114Jerome Svigals. Smartcards - A security assessment
115 -- 118Belden Menkus. The new importance of business continuity in data processing disaster recovery planning
119 -- 121Edwin B. Heinlein. Communications, security, privacy and the law
137 -- 144Chin-Chin Chang, Wen-Yuan Liao. A remote password authentication scheme based upon ElGamal s signature scheme
145 -- 160Yishay Spector, Jacob Ginzberg. Pass-sentence - a new approach to computer code

Volume 13, Issue 1

4 -- 14Harold Joseph Highland. Random bits & bytes
30 -- 33Alenka Hudoklin, Branislav Smitek. Computer systems security in Slovenia
53 -- 57Jau-Liang Chen, Tzonelih Hwang. Identity-based conference key broadcast schemes with user authentication
59 -- 67Selwyn Russell. Audit-by-receiver paradigms for verification of authorization at source of electronic documents
69 -- 78Edward P. Dawson, Diane Donovan. The breadth of Shamir s secret-sharing scheme
79 -- 84Bao-Min Shao, Jing-Jang Hwang, PeCheng Wang. Distributed assignment of cryptographic keys for access control in a hierarchy