Journal: Computers & Security

Volume 2, Issue 3

213 -- 0Harold Joseph Highland. Editorial
218 -- 222Jerome Lobel. The state-of-the-art in computer security
223 -- 229Charles Cresson Wood. Enhancing information security with the information resource management approach
230 -- 236John M. Carroll. Decision support for risk analysis
237 -- 241Brian G. P. Fry, William F. Main. A conceptual methodology for evaluating security requirements for data assets
242 -- 247Harvey S. Koch. Implementing an integrated test facility audit using differential files
248 -- 255H. Rex Hartson. Teaching protection in computing: A research-oriented graduate course
256 -- 260Jan H. P. Eloff. Selection process for security packages
261 -- 267F. Ayoub. The design of complete encryption networks using cryptographically equivalent permutations
268 -- 274Arthur Sorkin. Requirements for a secure terminal switch
275 -- 280Norman R. Bottom Jr.. An informational theory of security

Volume 2, Issue 2

102 -- 115William A. J. Bound, Dennis R. Ruth. Making risk analysis a useful management tool with microcomputer electronic worksheet packages
117 -- 119Kristian Beckman. IFIP's first security congress : The multi-million step
132 -- 143Andrew D. Warren. Evaluating the risks of computer fraud and error
144 -- 152Ronald Paans, Guus Bonnes. Surreptitious security violation in the MVS operating system
153 -- 162David A. Bonyun. The use of architectural principles in the design of certifiably secure systems
163 -- 170Per L. Hoving. To install an Access Control System, activities and checklists
171 -- 183Harold Joseph Highland. Impact of microcomputers on total computer security
189 -- 193Esther H. Highland. Computer Security Techniques: List of controls by cost

Volume 2, Issue 1

1 -- 2Harold Joseph Highland. Editorial
5 -- 10Charles Cresson Wood. Effective information system security with password controls
11 -- 15Belden Menkus. Notes on terrorism and data processing
16 -- 23William Hugh Murray. Computer security: Observations on the state of the technology
24 -- 34John M. Caroll, Oi-Lun Wu. Methodology for security analysis of data-processing systems
35 -- 40Nigel Backwith. Unique approach to security evaluation
41 -- 48Fred W. Weingarten. Controlling cryptographic publication
49 -- 62U. Bussolati, Giancarlo Martella. Towards a new approach to secure database design
63 -- 66Bruce Goldstein. Computer crime and its prevention
67 -- 72Michael J. Cerullo. Data communications controls
73 -- 77Carl Steve Guynes. EFTS impact on computer security
78 -- 81David R. Callaghan. Securing the distributed word processing network
82 -- 83Harold Joseph Highland. The hut six story: Breaking the Enigma codes : Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95
83 -- 0Harold Joseph Highland. CBEMA privacy and security bibliography (October 1982) : Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp
83 -- 84Harold Joseph Highland. Codes, ciphers and computers: An introduction to information security : Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., $13.95
84 -- 0Harold Joseph Highland. Advances in computer system security : Rein Turn, editor: Dedham MA: ARTECH HOUSE, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) $29.50
84 -- 0Harold Joseph Highland. Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE