Journal: Computers & Security

Volume 15, Issue 8

652 -- 653. From the editor
654 -- 0Harold Joseph Highland. Passwords, the web, and the internet
654 -- 655Harold Joseph Highland. Pornography and privacy
655 -- 656Harold Joseph Highland. It s a web browser! No, it s a weapon!
656 -- 657Harold Joseph Highland. Internet/web directory
657 -- 0Harold Joseph Highland. The enemy within
658 -- 660Harold Joseph Highland. Ntis volumes of interest
661 -- 671Jim Reid. Plugging the holes in host-based authentication
695 -- 705Lam-for Kwok, Dennis Longley. A security officer s workbench
707 -- 724Frederick B. Cohen. A secure world-wide-web daemon
725 -- 732Markus Michels, David Naccache, Holger Petersen. GOST 34.10 - A brief overview of Russia s DSA

Volume 15, Issue 7

550 -- 551. From the editor
552 -- 560Harold Joseph Highland. Random bits & bytes
561 -- 566Tim Porter. Information warfare - Your company needs you!
576 -- 584Andrew J. Clark. Cryptographic controls - the eternal triangle:::, :::
595 -- 626Vesselin Bontchev. Possible macro virus attacks and how to prevent them
627 -- 632Cees J. A. Jansen, Piet van der Vlist. Message encipherment with minimal expansion and redundancy - doing better than ISO-10126
633 -- 645John Yesberg, Mark S. Anderson. Quantitative authentication and vouching

Volume 15, Issue 6

458 -- 469Harold Joseph Highland. Random bits & bytes
471 -- 476Robert L. Frank. Security issues in the virtual corporation
477 -- 485Ken Lindup. The role of information security in corporate governance
486 -- 498Gerald L. Kovacich. Establishing a network security programme
499 -- 500Edwin B. Heinlein. Year 2000 - A real is security issue
501 -- 506John Sherwood. SALSA: A method for developing the enterprise security architecture and strategy
507 -- 514Jim Press. Object oriented cryptographic facility design: Export considerations
525 -- 536Vijay Varadharajan, Claudio Calvelli. Extending the schematic protection model - II. Revocation
537 -- 544Sung-Ming Yen. Cryptanalysis and repair of the multi-verifier signature with verifier specification

Volume 15, Issue 5

356 -- 366Harold Joseph Highland. Random bits & bytes
369 -- 375Edwin B. Heinlein. Computer security in China
377 -- 386Rolf T. Moulton, Mark E. Moulton. Electronic communications risk management: A checklist for business managers
387 -- 390Harold Joseph Highland. IFIP TC 11 news
431 -- 439Tzong-Chen Wu, Hung-Sung Sung. Authenticating passwords over an insecure channel
441 -- 450Gregory B. White, Udo W. Pooch. Cooperating security managers: Distributed intrusion detection systems

Volume 15, Issue 4

270 -- 280Harold Joseph Highland. Random bits & bytes
281 -- 288Rossouw von Solms. Information security management: The second generation
297 -- 316Thomas Finne. The information security chain in a company
327 -- 338Joan Borrell, Josep RifĂ . An implementable secure voting scheme
339 -- 348Wen-Shenq Juang, Chin-Laung Lei. A collision-free secret ballot protocol for computerized general elections

Volume 15, Issue 3

184 -- 197Harold Joseph Highland. Random Bits & Bytes
198 -- 202Nigel Miller. Establishing web sites - legal issues and risks
203 -- 208Clive Blatchford. Internet as a Pornotopia?
209 -- 211Paul Evans. Information protection for publishers
212 -- 220Eike Born. Enforcing legal ownership rights by an access control system
231 -- 237Shiuh-Jeng Wang, Jin-Fu Chang. Smart card based secure password authentication scheme
239 -- 248Willem G. de Ru, Jan H. P. Eloff. Risk analysis modelling with the use of fuzzy logic
249 -- 262Jing-Jang Hwang. A conventional approach to secret balloting in computer networks

Volume 15, Issue 2

90 -- 99Harold Joseph Highland. Random bits & bytes
100 -- 102Edwin B. Heinlein. Medical records security
103 -- 121Frederick B. Cohen. A note on distributed coordinated attacks
141 -- 155Kiyoto Tanaka, Hiroyuki Matsumoto, Ikuro Oyaizu. A confidentiality system for ISDN inter-PC high-speed file transfer
157 -- 170Marcel E. M. Spruit, Maarten Looijen. IT security in Dutch practice
171 -- 176Udi Manber. A simple scheme to make passwords based on one-way functions much harder to crack

Volume 15, Issue 1

2 -- 3. From the editor
4 -- 11Harold Joseph Highland. Random bits & bytes
13 -- 16Jon David. The new face of the virus threat
17 -- 26Mark Buckwell. The spook solution - Now open for business
27 -- 37Paul Smith. Achieving interoperable security services in open systems products
39 -- 43Thierry Moreau. A probabilistic flaw in PGP design?
55 -- 71Jan H. P. Eloff, Ralph Holbein, Stephanie Teufel. Security classification for documents
73 -- 81Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang. An access control scheme based on Chinese remainder theorem and time stamp concept