Journal: Computers & Security

Volume 21, Issue 8

674 -- 67E. Eugene Schultz. The gap between cryptography and information security
677 -- 688E. Eugene Schultz. Security Views
689 -- 693Stephen Hinde. Compsec 2002: the complete security circle
694 -- 695Andrew Armstrong. KLEZ H
696 -- 700Jon David. Giga Security
701 -- 704Harry Demaio. Global Trust, Certification and (ISC):::2:::
705 -- 711Jeffrey Hunker. Policy challenges in building dependability in global infrastructures
719 -- 735Francesco Bergadano, Davide Cavagnino, Bruno Crispo. Individual Authentication in Multiparty Communications
736 -- 749S. Holeman, G. Manimaran, James Davis, Anirban Chakrabarti. Differentially secure multicasting and its implementation methods
750 -- 759Sheng Zhong. A practical key management scheme for access control in a user hierarchy

Volume 21, Issue 7

578 -- 580E. Eugene Schultz. The US Government bigger and better information security?
581 -- 590E. Eugene Schultz. Security Views
592 -- 606Stephen Hinde. Spam, scams, chains, hoaxes and other junk mail
607 -- 608Andrew Armstrong. Bugbear
609 -- 612Matt Bishop. Trends in academic research: vulnerabilities analysis and intrusion detection
613 -- 616Brian McKenna. Managed Security Services new economy relic or wave of the future?
617 -- 619H. S. Venter, Jan H. P. Eloff. Vulnerabilities categories for intrusion detection system
620 -- 623Chris Pounder. Security policy update
636 -- 647Sarah Gordon, Richard Ford. Cyberterrorism?
648 -- 664Steve Kenny, Larry Korba. Applying digital rights management systems to privacy rights management
665 -- 667Lei Fan, Jian-hua Li, HongWen Zhu. An enhancement of timestamp-based password authentication scheme

Volume 21, Issue 6

481 -- 490E. Eugene Schultz. Security Views
491 -- 496Stephen Hinde. The Blue Screen of Death and other deadly bugs
497 -- 502Andy Nikishin. I-Worm.Lentin (aka Yaha)
503 -- 505Chris Pounder. The US s National Strategy for Homeland Security
506 -- 513Jon David. Policy enforcement in the workplace
514 -- 519August Bequai. White collar crime: a handmaiden of international tech terrorism
520 -- 521Sarah Hilley. Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK
526 -- 531E. Eugene Schultz. A framework for understanding and predicting insider attacks
557 -- 564Virginia E. Rezmierski, Marshall R. Seese Jr., Nathaniel St. Clair II. University systems security logging: who is doing it and how far can they go?
565 -- 570Tzer-Shyong Chen, Yu-Fang Chung. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm

Volume 21, Issue 5

382 -- 384E. Eugene Schultz. Taking a stand on hackers
385 -- 396E. Eugene Schultz. Security Views
397 -- 401Bill Hancock. Security crisis management the basics
402 -- 409Karin Höne, Jan H. P. Eloff. Information security policy what do international information security standards say?
410 -- 412Andy Nikishin. Much Ado About Nothing: Win32 Perrun
413 -- 420William J. Caelli. Trusted ...or... trustworthy: the search for a new paradigm for computer and network security
421 -- 423Brian McKenna. Enterprise in focus at NetSec 2002
424 -- 432Stephen Hinde. The perils of privacy
439 -- 448Yihua Liao, V. Rao Vemuri. Use of K-Nearest Neighbor classifier for intrusion detection
449 -- 460Der-Chyuan Lou, Jiang-Lung Liu. Steganographic Method for Secure Communications
461 -- 471Marit Hansen, Kristian Köhntopp, Andreas Pfitzmann. The Open Source approach opportunities and limitations with respect to security and privacy

Volume 21, Issue 4

290 -- 292E. Eugene Schultz. The Sorry State of Law Enforcement
293 -- 302E. Eugene Schultz. Security views
303 -- 309Steve Purser. Why access control is difficult
310 -- 321Stephen Hinde. Security surveys spring crop
322 -- 327Andy Nikishin. The Klez.H worm dissected
328 -- 332Chris Pounder. The emergence of a comprehensive obligation towards computer security
333 -- 337August Bequai. Syndicated crime and international terrorism: the lessons of 9-11
345 -- 355Younghwa Lee, Jintae Lee, Zoonky Lee. Integrating Software Lifecycle Process Standards with Security Engineering
356 -- 371Peter Ward, Clifton L. Smith. The Development of Access Control Policies for Information Technology Systems
372 -- 375Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng. An Efficient and Practical Solution to Remote Authentication: Smart Card

Volume 21, Issue 3

201 -- 211E. Eugene Schultz. Security Views
212 -- 21Stephen Hinde. It Was Déjá vu all Over Again
220 -- 228Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices
229 -- 238Gary McGraw. On Bricks and Walls: Why Building Secure Software is Hard
240 -- 245Chris Pounder. Anti-Terrorism Legislation: The Impact on The Processing of Data
253 -- 265Joris Claessens, Valentin Dem, Danny De Cock, Bart Preneel, Joos Vandewalle. On the Security of Today s Online Electronic Banking Systems
266 -- 284Elmé Smith, Jan H. P. Eloff. A Prototype for Assessing Information Technology Risks in Health Care

Volume 21, Issue 2

101 -- 112E. Eugene Schultz. Security Views
113 -- 119Gerald L. Kovacich, Andy Jones. What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists
120 -- 125Bob Blakley. Security Insights
142 -- 163Joan L. Aron, Michael O Leary, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider. The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model
164 -- 171Victor R. L. Shen, Tzer-Shyong Chen. A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations
172 -- 192Lech J. Janczewski, Frank Xinli Shi. Development of Information Security Baselines for Healthcare Information Systems in New Zealand

Volume 21, Issue 1

5 -- 15E. Eugene Schultz. Security Views
16 -- 34Stephen Hinde. 2001: A Privacy Odyssey Revisited
35 -- 41Gerald L. Kovacich, Andy Jones. What InfoSec professionals should know about information warfare tactics by terrorists
62 -- 73G. Magklaras, Steven Furnell. Insider Threat Prediction Tool: Evaluating the probability of IT misuse
74 -- 76Chi-Kwong Chan, Lee-Ming Cheng. Cryptanalysis of a Timestamp-Based Password Authentication Scheme
77 -- 92Kapali Viswanathan, Colin Boyd, Ed Dawson. Hybrid Key Escrow: A New Paradigm