Journal: Computers & Security

Volume 14, Issue 8

660 -- 666Harold Joseph Highland. Random bits & bytes
667 -- 674Charles Cresson Wood. Writing infosec policies
675 -- 680Rebecca J. Duncan. There are some cracks in the cornerstone of information security
681 -- 690Christopher L. J. Holloway. Controlling digital signature services using a smartcard
691 -- 695Kenneth R. Lindup. A new model for information security policies
707 -- 717Love Ekenberg, Subhash Oberoi, István Orci. A cost model for managing information security hazards
719 -- 738Marshall D. Abrams, Marvin V. Zelkowitz. Striving for correctness

Volume 14, Issue 7

574 -- 585Harold Joseph Highland. Random bits & bytes
587 -- 598Christopher L. J. Holloway. Controlling the use of cryptographic keys
599 -- 604Sarah Gordon. Internet 101
621 -- 631Ben Soh, Tharam S. Dillon. Setting optimal intrusion-detection thresholds
633 -- 643Fred de Koning. A methodology for the design of security plans
645 -- 651James Backhouse, Gurpreet Dhillon. Managing computer crime: a research outlook

Volume 14, Issue 6

480 -- 488Harold Joseph Highland. Random bits & bytes
496 -- 517Jim Reid. Open systems security: Traps and pitfalls
527 -- 539Frank Stoll. The need for decentralization and privacy in mobile communications networks
541 -- 566Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson. MCF: a malicious code filter

Volume 14, Issue 5

365 -- 371Harold Joseph Highland. Random bits & bytes
377 -- 383Jean Hitchings. Deficiencies of the traditional approach to information security and the requirements for a new methodology
385 -- 389John Leach. Dynamic authentication for smartcards
391 -- 402Sarah Gordon. Technologically enabled crime: Shifting paradigms for the Year 2000
435 -- 448Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas. Design of a neural network for recognition and classification of computer viruses
449 -- 463Muninder P. Kailay, Peter Jarratt. RAMeX: a prototype expert system for computer security risk analysis and management
465 -- 472Thomas Hardjono, Jennifer Seberry. Applications of smartcards for anonymous and verifiable databases

Volume 14, Issue 4

274 -- 282Harold Joseph Highland. Random bits & bytes
283 -- 284Charles Cresson Wood. Shifting information systems security responsibility from user organizations to vendor/publisher organizations
287 -- 288Charles Cresson Wood, Karen Snow. ISO 9000 and information security
289 -- 296Gerald L. Kovacich. Recovering computer-generated evidence
307 -- 321Simon R. Wiseman. Classification services in the SWORD secure DBMS
323 -- 348Greg O Shea. Redundant access rights
349 -- 357Simon J. Shepherd. A high speed software implementation of the Data Encryption Standard

Volume 14, Issue 3

188 -- 196Harold Joseph Highland. Random bits & bytes
197 -- 198Edwin B. Heinlein. Principles of information systems security
199 -- 204Scott Hill, Martin Smith. Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace
205 -- 214Hyun-jung Kim. Biometrics, is it a viable proposition for identity authentication and access control?
225 -- 231Frank Deane, Kate Barrelle, Ron Henderson, Doug Mahar. Perceived acceptability of biometric security systems
233 -- 249Matt Bishop, Daniel V. Klein. Improving system security via proactive password checking
251 -- 265H. A. S. Booysen, Jan H. P. Eloff. Classification of objects for improved access control

Volume 14, Issue 2

90 -- 102Harold Joseph Highland. Random Bits & Bytes
103 -- 112Manfred Möhrenschlager. Hacking: To criminalize or not ? - suggestions for the legislature
113 -- 115Henry B. Wolfe. Computer security: For fun and profit
135 -- 145Tzong-Chen Wu, Wei-Hua He. A geometric approach for sharing secrets
147 -- 157Marshall D. Abrams, Jonathan D. Moffett. A higher level of computer security through active policies
159 -- 166Hui-Min Tsai, Chin-Chen Chang. A cryptographic implementation for dynamic access control in a user hierarchy
167 -- 180John G. Cleary, Sean A. Irvine, Ingrid Rinsma-Melchert. On the insecurity of arithmetic coding

Volume 14, Issue 1

4 -- 13Harold Joseph Highland. Random bits & bytes
14 -- 23Martin Smith, John Sherwood. Business continuity planning
45 -- 56Marshall D. Abrams, Michael V. Joyce. Trusted system concepts
57 -- 68Marshall D. Abrams, Michael V. Joyce. Trusted computing update
69 -- 81Marshall D. Abrams, Michael V. Joyce. New thinking about information technology security