Journal: Computers & Security

Volume 16, Issue 8

650 -- 656Pauline Ratnasingham. EDI security - re-evaluation of controls and its implications on the organizations
657 -- 662Gerald L. Kovacich. How to market yourself as an ISSO
663 -- 668Alasdair Kemp. Embedded systems: The other problem
669 -- 674Andrew J. Clark. Key recovery - why, how, who?
687 -- 708Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf. Protecting databases from inference attacks
709 -- 719Dimitris Gritzalis. A baseline security policy for distributed healthcare information systems

Volume 16, Issue 7

570 -- 571. From the editor
572 -- 582Donn B. Parker. The strategic values of information security in business
583 -- 589Nigel Hickson. Encryption policy - A UK perspective
590 -- 594Chris Pounder. First steps towards a european union policy on the securing of electronic communications
595 -- 602Andy Jones. Penetration testing and system audit - experience gained during the investigation of systems within the UK
603 -- 609John Sherwood. Managing security for outsourcing contracts
610 -- 618Gerald L. Kovacich. Information systems security metrics management
629 -- 641Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat. Cognitive, associative and conventional passwords: Recall and guessing rates

Volume 16, Issue 6

452 -- 453. From the editor
455 -- 458Gerald L. Kovacich. ISSO career development
469 -- 479Thomas Finne. Information security implemented in: The theory on stock market efficiency, Markowitz s portfolio theory and porter s value chain
481 -- 506Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic. Two-phase cryptographic key recovery system
543 -- 549Les Labuschagne, Jan H. P. Eloff. Improved system-access control using complementary technologies
551 -- 563Simon N. Foley. Building Chinese walls in standard unix:::TM:::

Volume 16, Issue 5

350 -- 355John Meyer. Professor Harold Joseph Highland FICS, FACM
356 -- 364. Random bits & bytes
365 -- 368Harold Joseph Highland. The threats on the web
369 -- 386Harold Joseph Highland. Data encryption: A non-mathematical approach
387 -- 411Harold Joseph Highland. Historical bits & bytes
412 -- 415Harold Joseph Highland. A history of computer viruses - Introduction
416 -- 429Harold Joseph Highland. A history of computer viruses - The famous trio
430 -- 438Harold Joseph Highland. A history of computer viruses: Three special viruses
439 -- 449Harold Joseph Highland. Procedures to reduce the computer virus threat

Volume 16, Issue 4

266 -- 275Harold Joseph Highland. Random bits & bytes
277 -- 284Tom Mulhall. Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology
285 -- 290Tom Mulhall. Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem
291 -- 297Tom Mulhall. Where have all the hackers gone?: Part 3 - Motivation and deterrence
298 -- 303Tom Mulhall. Where have all the hackers gone?: Part 4 - Legislation
304 -- 306Tom Mulhall. Where have all the hackers gone?: Part 5 - Conclusions
307 -- 315Tom Mulhall. Where have all the hackers gone?: Part 6 - Appendices and bibliography
316 -- 320Charles Cresson Wood. A management view of internet electronic commerce security
321 -- 326Gerald L. Kovacich. The ISSO must understand the business and management environment
339 -- 344Chih-Hung Wang, Tzonelih Hwang. Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication

Volume 16, Issue 3

189 -- 196James E. Molini. Electronic borders: Defining and protecting national networks
197 -- 204Thomas Finne. What are the information security risks in decision support systems and data warehousing?
205 -- 0Harold Joseph Highland. IFIP/SEC 97 conference proceedings
223 -- 232Zbigniew Ciechanowicz. Risk analysis: requirements, conflicts and problems
233 -- 257Ivan Krsul, Eugene H. Spafford. Authorship analysis: identifying the author of a program

Volume 16, Issue 2

94 -- 114Fred Cohen. Information system defences: A preliminary classification scheme
115 -- 125Stephane G. Bouniol. The puzzle theorem - The less I know, the less I can disclose ..
137 -- 144Dennis M. Volpano, Cynthia E. Irvine. Secure flow typing
145 -- 164O. Tettero, D.-J. Out, Henry M. Franken, J. Schot. Information security embedded in the design of telematics systems

Volume 16, Issue 1

2 -- 3John Meyer. From the editor
4 -- 13Harold Joseph Highland. Random bits & bytes & bytes
14 -- 24Gerald L. Kovacich. Information warfare and the information systems security professional
29 -- 46Fred Cohen. Information system attacks: A preliminary classification scheme
47 -- 59Harold Joseph Highland. Current literature The 19th National Information Systems Security Conference
71 -- 79Ben Soh, Tharam S. Dillon. System intrusion processes: a simulation model