Journal: Computers & Security

Volume 19, Issue 8

664 -- 665Bill Hancock. From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7
665 -- 666Bill Hancock. Feeling Sorry for Microsoft?
666 -- 667Bill Hancock. However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again
667 -- 668Bill Hancock. Wireless Big Brother
668 -- 669Bill Hancock. NASA Hacker Pleads Guilty
669 -- 670Bill Hancock. Getting the Laws to Help Combat Cybercrime (There s a grand idea)
669 -- 669Bill Hancock. Canadian Teen Mafiaboy Pleads Guilty
671 -- 673Bill Hancock. Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware
671 -- 671Bill Hancock. Internet Biz Group Calls for Cybercrime Treaty Delay
673 -- 674Bill Hancock. Hacktivism Increasing
674 -- 676Bill Hancock. CIA Chat Room Causes Grief
674 -- 674Bill Hancock. US Department of Defense Prepares Cybercrime Database
676 -- 677Bill Hancock. Japan Creates Cyberconditions for IT National Revolution
677 -- 678Bill Hancock. US Privacy Law Proposals Cause Concerns
679 -- 687Stephen Hinde. New Names For Old - A Personal Surf Through Compsec 200
688 -- 691August Bequai. America s Internet Commerce and The Threat of Fraud
692 -- 697Andy Clarke, Vince Gallo. The Software Colander Holes in Messagin
698 -- 709Mariki M. Eloff, Sebastiaan H. von Solms. Information Security Management: An Approach to Combine Process Certification And Product Evaluation
710 -- 719John Sherwood. Opening Up The Enterprise
731 -- 746Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro. Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

Volume 19, Issue 7

570 -- 571Bill Hancock. New Classes of Unix/Linux Attacks
571 -- 572Bill Hancock. American Express Creates Disposable Credit Card Number
572 -- 573Bill Hancock. Baltimore Releases Security Developer Freeware
572 -- 572Bill Hancock. Microsoft Releases New IIS Security Tool
573 -- 574Bill Hancock. Files Streams Virus Infects in an Old and New Way
574 -- 575Bill Hancock. Hacker Insurance Now Part of the Business Risk Management Kit
574 -- 574Bill Hancock. Trinity v3, a DDoS Tool, Hits the Streets
575 -- 577Bill Hancock. Wireless Crazed? No Security For You!
577 -- 578Bill Hancock. White House Supporting Open Source Code
578 -- 579Bill Hancock. White House Security Summit Builds Towards a B2B Security Standard
579 -- 579Bill Hancock. Cellular Security Hazards
580 -- 580Bill Hancock. UK Fuel Taxes Protestor Accused of Mass Hacking
580 -- 580Bill Hancock. US Government Board Setting Up Security Metrics
581 -- 581Bill Hancock. Privacy Group Wants Web Bugs Disclosures
581 -- 583Bill Hancock. Site Spoofing Becomes More Popular
583 -- 584Bill Hancock. First PDA Virus Hits the Airwaves
585 -- 590Stephen Hinde. Do You Know Your Organization s Achilles Heel?
591 -- 595August Bequai. Romancing The Internet And Management s Quagmire
596 -- 614Julie D. Nosworthy. A Practical Risk Analysis Approach: Managing BCM Risk
615 -- 620Basie von Solms. Information Security - The Third Wave?
645 -- 656Rachael Pond, John Podd, Julie Bunnell, Ron Henderson. Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates

Volume 19, Issue 6

476 -- 477Bill Hancock. A Need for a Network Security Czar
477 -- 477Bill Hancock. US Government Fighting for Expanded Wiretap Laws
477 -- 479Bill Hancock. E-Commerce Paranoia: Flaws in Code
479 -- 480Bill Hancock. Truly Certified: Security Certifications Updat
480 -- 487Bill Hancock. Digital Certificates Get Creative
482 -- 482Bill Hancock. Health Care Security: A Hard Look at a Growing Problem
483 -- 483Bill Hancock. Safeway UK s Website Shut Down
483 -- 483Bill Hancock. Philippine Government Creates Incident Response Team
483 -- 485Bill Hancock. DDoS Defence Gets Regulatory
485 -- 486Bill Hancock. Visa s Ten Commandments for E-Security Online
486 -- 487Bill Hancock. Porngate ?
487 -- 487Bill Hancock. What You Sell Online in France Could Be Restricted...
488 -- 488Bill Hancock. Hackers Still Love to Attack the Pentago
488 -- 491Bill Hancock. Spying At Home: A New Pastime to Detect Online Romanc
491 -- 493Bill Hancock. Is a Convicted Hacker Really Reformed and Should You Hire Them?
493 -- 494Bill Hancock. DefCon Recruiting JamFest
494 -- 495Bill Hancock. Hacker Target: Mobile Phones
495 -- 496Bill Hancock. GeoCities Ordered to Report on Information Poste
495 -- 495Bill Hancock. E-Mail Privacy Issues Escalate
496 -- 497Bill Hancock. Hackers Breach Firewall
497 -- 498Bill Hancock. Lotus Domino Holes Up
499 -- 504Stephen Hinde. Fireworks, Beer and Old Halfpennies - The Risks of Assumption
505 -- 519Gerald L. Kovacich. Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why
520 -- 528Fred Cohen. A Mathematical Structure of Simple Defensive Network Deception
529 -- 539Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds. Authentication and Supervision: A Survey of User Attitudes
551 -- 558Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Ticket and Challenge-Based Protocols for Timestamping
559 -- 563Andres Torrubia, Francisco J. Mora. Information Security in Multiprocessor Systems Based on the X86 Architecture

Volume 19, Issue 5

382 -- 383Bill Hancock. Security Views
383 -- 384Bill Hancock. I Agree Legal Agreements Get Legislated
385 -- 387Bill Hancock. The US Government Tells Its Users to Clean Up Their E-mail
387 -- 388Bill Hancock. Home PC s Targeted by Hackers (Duh!)
388 -- 388Bill Hancock. CIO s Get Serious About Best Security Practices
389 -- 391Bill Hancock. Microsoft a Popular Virus Target Due to Ubiquity
389 -- 389Bill Hancock. Yahoo Faces Identity Crisis
391 -- 392Bill Hancock. UK s RIP Bill Creates Official Snooping
392 -- 393Bill Hancock. Extortion Going Online
393 -- 393Bill Hancock. Office 2000 Patch Recommended by CERT
393 -- 394Bill Hancock. Self-Regulation for Privacy Doesn t Work Says FTC
394 -- 395Bill Hancock. ...But the Industry Wants Self-Regulation
395 -- 396Bill Hancock. US Senate Wakes Up to Need for Cybertools for Law Enforcers
396 -- 397Bill Hancock. PGP V5.0 Keys Potentially Insecure
397 -- 398Bill Hancock. Canadian Credit Card Conundrum Caused by a Cracker
398 -- 400Bill Hancock. Network Solutions Re-evaluates Security
398 -- 398Bill Hancock. Suspect Charged in Love Bug Worm has Charges Dropped
400 -- 401Bill Hancock. CMU Sets Up a Sister to CERT
401 -- 401Bill Hancock. Speedy Response Yields Success at DOE
402 -- 403Bill Hancock. Who s to Blame?
402 -- 402Bill Hancock. AOL Gets Busted - Again
403 -- 403Bill Hancock. Wireless Ubiquity for E-Biz
404 -- 404Bill Hancock. And Now, the Bug-in-Your-Site Award Goes To...
404 -- 405Bill Hancock. Isn t It Interesting What You Can Buy At An Auction Site? TV s, Computers, Drugs
405 -- 407Bill Hancock. G8 Thinks About Cybercrime (It s About Time, Too)
408 -- 420Stephen Hinde. Love Conquers All?
421 -- 427Gerald L. Kovacich. Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon
428 -- 441Stephen M. Matyas, Jeff Stapleto. A Biometric Standard for Information Management and Security
453 -- 465Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho. A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
466 -- 469Mohammad Peyravian, Nevenko Zunic. Methods for Protecting Password Transmission

Volume 19, Issue 4

296 -- 297Bill Hancock. Intel Eliminates ID from New Chips
296 -- 296Bill Hancock. Suspected Hackers Arrested in Russian Credit-Card Fraud
297 -- 298Bill Hancock. DOD Finds Plans Online Reserve Unit Assesses Risk
297 -- 297Bill Hancock. European Parliament Doesn t Like Anonymity Online
298 -- 298Bill Hancock. Agencies Are Own Worst Enemy
298 -- 300Bill Hancock. US Department of Energy Security Criticized - Again
300 -- 301Bill Hancock. This is What Happens When You Lose Your Computer With Classified Data On It...
301 -- 302Bill Hancock. Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ
302 -- 303Bill Hancock. Justice Department Conducting Criminal Probe in Former CIA Director Activities
303 -- 305Bill Hancock. Apache Site Defaced
306 -- 307Bill Hancock. US and Europe Cybercrime Agreement Problems
307 -- 308Bill Hancock. Cyberstalking on the Rise
308 -- 309Bill Hancock. Large Child Pornography Ring Busted in Texas
309 -- 310Bill Hancock. New Denial of Service Attack on Internet
310 -- 310Bill Hancock. US Supreme Court Confirms ISPs Not Liable in E-mail Messages
310 -- 311Bill Hancock. Software Scam - 17 Indicted
312 -- 320Stephen Hinde. Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web
321 -- 325Richard Barber. Security in a Mobile World Is Bluetooth the Answer?
326 -- 336Gerald L. Kovacich. Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care?
337 -- 347Julie D. Nosworthy. Implementing Information Security In The 21st Century Do You Have the Balancing Factors?
348 -- 356Petra van Krugten, Mark Hoogenboom. B2C Security Be Just Secure Enough
369 -- 374Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Multiparty Biometric-Based Authentication

Volume 19, Issue 3

202 -- 203Bill Hancock. Security Views
203 -- 204Bill Hancock. Network Warfare On The Rise
204 -- 205Bill Hancock. FBI Source Convicted of Hackin
205 -- 206Bill Hancock. Microsoft Whistler Release Posted to Internet
206 -- 207Bill Hancock. US Senate Passes Bill to Tighten Up Government Network
207 -- 207Bill Hancock. Cyberpatrol Reverse Engineering: Round 2
208 -- 208Bill Hancock. US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems
208 -- 208Bill Hancock. First Cybercrime Task Force City - Pittsburgh
209 -- 211Bill Hancock. More on the January, 2000, NSA Computer Problems
211 -- 212Bill Hancock. Another Insider Job on Wall Stree
211 -- 211Bill Hancock. Mexico s President Under Cyberattack - Again
212 -- 213Bill Hancock. USDOJ Goes Prime Time With Cybercrime Web Sit
212 -- 212Bill Hancock. FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers
213 -- 214Bill Hancock. EU and US Reach Agreement on Privacy Issues
214 -- 215Bill Hancock. Warning from the US Government: Companies Get Secure or..
215 -- 215Bill Hancock. China Relaxes Encryption Rules
216 -- 216Bill Hancock. French Card Forgery Note Could Work
216 -- 217Bill Hancock. US Law Enforcement Needs You!
217 -- 218Bill Hancock. UK Law Enforcement Bemoans Criminal Activities on Interne
218 -- 219Bill Hancock. Kevin Mitnick Gets His Day in Congres
218 -- 218Bill Hancock. Intel Creates New Plans for Notebook Security
219 -- 220Bill Hancock. Web Site Owners Seek Security People Apply Now!
220 -- 221Bill Hancock. Generation X Hackers?
222 -- 229Stephen Hinde. Life Was Simple Then
230 -- 233Richard Barber. Implementing Public Key Infrastructures in a Dynamic Business Environment
234 -- 242Thomas Finne. Information Systems Risk Management: Key Concepts and Business Processes
243 -- 256Mariki M. Eloff, Sebastiaan H. von Solms. Information Security Management: A Hierarchical Framework for Various Approaches
267 -- 281Spyros Kokolakis, Evangelos A. Kiountouzis. Achieving Interoperability in a Multiple-Security- Policies Environment
282 -- 288Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Generation of RSA Keys That Are Guaranteed to be Unique for Each User

Volume 19, Issue 2

108 -- 109Bill Hancock. Alliance Formed to Fight Internet Attacks
108 -- 108Bill Hancock. Security Views
109 -- 110Bill Hancock. Code Paranoia about FBI Offerings to Detect DoS Infiltration
110 -- 111Bill Hancock. CIA says Russia and China are Building CyberSpy Organization
111 -- 113Bill Hancock. FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks
111 -- 111Bill Hancock. The SEC Hires CyberInvestigators to Search for Fraud
113 -- 113Bill Hancock. Industry Teaming on ISACs
113 -- 114Bill Hancock. In Wake of Attacks, FBI Using Racketeering Laws for Prosecution
114 -- 115Bill Hancock. Mafiaboy Hacker Eyed In Attacks
115 -- 115Bill Hancock. Japan Web Hackers Use Chinese and US Servers
116 -- 116Bill Hancock. Y2Hack Get-Together in Israel Under Political Attack
116 -- 117Bill Hancock. US Pentagon Defense Messaging System Shows Deficiencies in Security
117 -- 117Bill Hancock. Security Managers Cite Need for Real-Time Security
119 -- 127Stephen Hinde. New Millennium, Old Failures
128 -- 132Steve Webb. Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age
133 -- 140Gerald L. Kovacich, William C. Boni. Internet Targets
141 -- 148Michael Collins. Telecommunications Crime - Part 3
149 -- 163Mark Hoogenboom, Patrick Steemers. Security For Remote Access And Mobile Application
185 -- 194Lynette Barnard, Rossouw von Solms. A Formalized Approach to the Effective Selection and Evaluation of Information Security Control

Volume 19, Issue 1

6 -- 7Bill Hancock. Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild
7 -- 8Bill Hancock. Cell Phone Crypto Cracked
8 -- 9Bill Hancock. Clinton s Proposed Crypto Regulations Under Attack
9 -- 10Bill Hancock. Overhauling the National Security Agency?
10 -- 12Bill Hancock. Down Under, Hacking Private Computers by the Government is Legal
12 -- 13Bill Hancock. The S in SAP Doesn t Stand for Security
12 -- 12Bill Hancock. New York Times Fires Employees for Violating Internal E-mail Policies
13 -- 14Bill Hancock. Anonymizing Software Causes Law Enforcement Concerns
13 -- 13Bill Hancock. Melissa Virus Creator Pleads Guilty
14 -- 16Bill Hancock. Security Problems Go Mobile In Your Next Car
16 -- 17Bill Hancock. The L0pht Goes Corporate and becomes @Stake
18 -- 20Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett. Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction
21 -- 27Michael Smith, Paul C. van Oorschot, Michael Willett. Cryptographic Information Recovery Using Key Recover
28 -- 30Michael Willett. Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products
31 -- 36John Kennedy, Stephen M. Matyas, Nevenko Zunic. Key Recovery Functional Model
37 -- 40Stephen M. Matyas, Nevenko Zunic. Additional Key Recovery Function
41 -- 47Sarbari Gupta. A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms
48 -- 55Chuck Williams, Nevenko Zunic. Global Interoperability for Key Recovery
56 -- 68Sarbari Gupta, Stephen M. Matyas. Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery
69 -- 81Abby Maclean, Stephen M. Matyas, Nevenko Zunic. Organization Implementation Guidelines for Recovery of Encrypted Information
82 -- 85Nevenko Zunic. Organization Considerations for Retrieval of Stored Data via Key Recovery Methods
86 -- 90Tom Markham, Chuck Williams. Key Recovery Header for IPSEC
91 -- 99David M. Balenson, Tom Markham. ISAKMP Key Recovery Extension
100 -- 104Timothy G. Shoriak. SSL/TLS Protocol Enablement for Key Recovery