Journal: Computers & Security

Volume 20, Issue 8

643 -- 656Bill Hancock. Security Views
657 -- 666Stephen Hinde. If you can meet with triumph and disaster and treat those two impostors just the same...
667 -- 670Charles Cresson Wood. What Do The Recent Terrorist Attacks Mean For The American Information Security Profession?
671 -- 675Denis Zenkin. Guidelines for the Protecting the Corporate against Viruse
676 -- 683Enrico Biermann, E. Cloete, Lucas M. Venter. A comparison of Intrusion Detection systems
693 -- 714Joan L. Aron, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider. The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model
715 -- 723Gurpreet Dhillon, Steve Moore. Computer crimes: theorizing about the enemy within
724 -- 738Andres Torrubia, Francisco J. Mora, Luis Marti. Cryptography Regulations for E-commerce and Digital Rights Management

Volume 20, Issue 7

546 -- 560Bill Hancock. Security View
561 -- 567Stephen Hinde. Lessons Learned
568 -- 572Stephen Hinde. Incalculable potential for damage by cyber-terrorism
573 -- 576Chris Pounder. The European Union Proposal for a Policy Towards Network and Information Security
577 -- 584Mariana Gerber, Rossouw von Solms. From Risk Analysis to Security Requirements
592 -- 611David W. Chadwick, Andrew Basden. Evaluating Trust in a Public Key Certification Authority
612 -- 619Chu-Hsing Lin. Hierarchical key assignment without public-key cryptography
620 -- 634E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy. Usability and Security An Appraisal of Usability Issues in Information Security Methods

Volume 20, Issue 6

451 -- 467Bill Hancock. U.S. DoD Puts Up Blocks to Code Red
468 -- 474Stephen Hinde. Omnia te adversum spectantia, nulla retorsum:::*:::
475 -- 478August Bequai. Organized Crime Goes Cyber
479 -- 484Steve Purser. A Simple Graphical Tool For Modelling Trust
485 -- 490Steven Philippsohn. Money Laundering on the Internet
491 -- 503Bruce Schneier. Managed Security Monitoring: Network Security for the 21st Centur
504 -- 508Basie von Solms. Information Security - A Multidimensional Discipline
525 -- 532Reinhardt A. Botha, Jan H. P. Eloff. Access Control in Document-centric Workflow Systems An Agent-based Approach
533 -- 538Wen-Hung Yeh, Jing-Jang Hwang. Hiding Digital Information Using a Novel System Scheme

Volume 20, Issue 5

348 -- 363Bill Hancock. Security Views
364 -- 371Stephen Hinde. Cyberthreats: Perceptions, Reality and Protection
372 -- 373August Bequai. Proprietary Data: Eldorado in Cyber-Space
374 -- 379Richard Barber. Security in a Mobile World - is Bluetooth the Answer?
380 -- 383Chris Pounder. The Council of Europe Cyber-Crime Convention
384 -- 391C. M. Trompeter, Jan H. P. Eloff. A Framework for the Implementation of Socio-ethical Controls in Information Security
392 -- 394Thomas W. Cusick. Computer Licence Plates
395 -- 399Paul Evans. Conference Report - the Global Forum for Law Enforcement and National Security, Edinburgh, 2001

Volume 20, Issue 4

278 -- 294Bill Hancock. Security Views
295 -- 301Stephen Hinde. The Weakest Link
302 -- 307Gerald L. Kovacich. The Corporate Information Assurance Officer (CIAO)
308 -- 310Basie von Solms, Rossouw von Solms. Incremental Information Security Certification
311 -- 315Chris Pounder. Cyber crime: the backdrop to the Council of Europe Convention
316 -- 321Denis Zenkin. Fighting Against the Invisible Enemy - Methods for detecting an unknown virus

Volume 20, Issue 3

188 -- 201Bill Hancock. Security Views
202 -- 206Stephen Hinde. The Times They Are A-Changin
207 -- 213Gerald L. Kovacich. Protecting 21:::st::: Century Information It s Time for a Change
215 -- 218Basie von Solms. Corporate Governance and Information Security
219 -- 226Ivan Horrocks. Security Training: Education For an Emerging Profession?
227 -- 238Bob Carter. Securing Your Brand In Cyberspace
263 -- 270Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy. A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals

Volume 20, Issue 2

98 -- 126Bill Hancock. A Practical Risk
127 -- 131Stephen Hinde. The Search For Privacy
132 -- 145Richard Barber. The Evolution of Intrusion Detection Systems The Next Step
147 -- 154Adrian Wright. Controlling Risks of E-commerce Content
165 -- 172Gurpreet Dhillon. Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns
173 -- 179Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Alternative Method for Unique RSA Primes Generation

Volume 20, Issue 1

4 -- 5Bill Hancock. Y2K & Security A Low Priority Year
5 -- 6Bill Hancock. Voodoo is Alive and Well on Your Computer
6 -- 7Bill Hancock. Hand-held Virii On The Way
7 -- 7Bill Hancock. China Passes Law to Promote Internet Security Supposedly
7 -- 7Bill Hancock. Smarter Marines
8 -- 9Bill Hancock. Information Warfare Highlighted as a Concern by US Government
8 -- 8Bill Hancock. E-tailers Batten Down the Hatches
9 -- 10Bill Hancock. E-mail Spammers Jailed
10 -- 14Bill Hancock. The Chief Security Officer s Top Ten List for 2001
14 -- 15Bill Hancock. Safe Harbor Provision Adopters Few and Far Between
15 -- 17Bill Hancock. The Wireless Great Divide But Getting Smaller
17 -- 18Bill Hancock. It s a Privacy Thing in 2001
18 -- 19Bill Hancock. Fighting SPAM in Europe
19 -- 20Bill Hancock. Privacy Advocates Grow in Europe
21 -- 27Stephen Hinde. 2001: A Privacy Odyssey
28 -- 30August Bequai. Software Concerns And The Internet
37 -- 41Robert Graham. NIDS Pattern Search vs. Protocol Decode
43 -- 52Andrew Rathmell. Protecting Critical Information Infrastructures
53 -- 69Steven Philippsohn. Trends In Cybercrime An Overview Of Current Financial Crimes On The Internet
79 -- 89Jovan Dj. Golic. How to Construct Cryptographic Primitives from Stream Ciphers