Journal: Computers & Security

Volume 22, Issue 8

652 -- 653E. Eugene Schultz. Information security and the media
654 -- 663E. Eugene Schultz. Security views
664 -- 669Stephen Hinde. Computer security: Mapping the future
670 -- 672Hank Wolfe. Setting up an electronic evidence forensics laboratory
673 -- 674Jay G. Heiser. Beyond cryptography: Bruce Schneier s Beyond Fear: thinking sensibly about security in an uncertain world
675 -- 684J. Johnston, Jan H. P. Eloff, Les Labuschagne. Security and human computer interfaces
685 -- 692John Leach. Improving user security behaviour
695 -- 706Aykut Guven, Ibrahim Sogukpinar. Understanding users keystroke patterns for computer access security
707 -- 724John Reinke, Hossein Saiedian. The availability of source code in relation to timely response to security vulnerabilities
725 -- 727Kefei Chen, Sheng Zhong. Attacks on the (enhanced) Yang-Shieh authentication
728 -- 734Chin-Chen Chang, Ya-Fen Chang. Efficient anonymous auction protocols with freewheeling bids

Volume 22, Issue 7

556 -- 558E. Eugene Schultz. Patching Pandemonium
570 -- 576Stephen Hinde. Nimbyism, dominoes and creaking infrastructure
577 -- 579Hank Wolfe. Forensic evidence testimony - some thoughts
580 -- 584Rolf Moulton, Robert S. Coles. Applying information security governance
585 -- 588Nicolas Sklavos, Odysseas G. Koufopavlou. Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance
591 -- 595Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang. Security enhancement for the timestamp-based password authentication scheme using smart cards
596 -- 612Sang Hyun Oh, Won Suk Lee. An anomaly intrusion detection method by clustering normal user behavior
613 -- 623Sang-Jun Han, Sung-Bae Cho. Detecting intrusion with rule-based integration of multiple models
624 -- 642Harold W. Thimbleby. The reduced Enigma
643 -- 645Bin Wang, Jian-hua Li, Zhi-Peng Tong. Cryptanalysis of an enhanced timestamp-based password authentication scheme

Volume 22, Issue 6

464 -- 473E. Eugene Schultz. Security views: Online piracy battle heats up in US
474 -- 478Stephen Hinde. Spam: the evolution of a nuisance
482 -- 486John Leach. Security engineering and security RoI
487 -- 493Robert S. Coles, Rolf Moulton. Operationalizing IT Risk Management
494 -- 505Andrew Blyth, Daniel Cunliffe, Iain Sutherland. Security analysis of XML usage and XML parsing
506 -- 510Christopher Kelly, Chris Nelms. Roadmap to checking data migration
511 -- 514Elisa Bertino. RBAC models - concepts and trends
515 -- 516Brian McKenna. Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK
523 -- 526Hung-Yu Chien, Jinn-ke Jan. New hierarchical assignment without Public Key cryptography
527 -- 534Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang. Efficient proxy multisignature schemes based on the elliptic curve cryptosystem
535 -- 546Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun. Security middleware for enhancing interoperability of Public Key Infrastructure
547 -- 550Shyi-Tsong Wu, Bin-Chang Chieu. A user friendly remote authentication scheme with smart cards

Volume 22, Issue 5

366 -- 367E. Eugene Schultz. Pandora s Box: spyware, adware, autoexecution, and NGSCB
368 -- 377E. Eugene Schultz. Security Views
378 -- 387Stephen Hinde. Privacy legislation: a comparison of the US and European approaches
388 -- 391Hank Wolfe. Encountering encryption
402 -- 411Fred Cohen, Deanna Koike. Leading attackers through attack graphs with deceptions
412 -- 415Scott A. Vanstone. Next generation security for wireless: elliptic curve cryptography
416 -- 420Andrew Harding. SSL Virtual Private Networks
423 -- 434Martin Botha, Rossouw von Solms. Utilising fuzzy logic and trend analysis for effective intrusion detection
435 -- 449Gonzalo Álvarez, Slobodan Petrovic. A new taxonomy of Web attacks suitable for efficient encoding
450 -- 452Sheng Zhong, Tianwen Lin. A comment on the Chen-Chung scheme for hierarchical access control
453 -- 456Chien-Lung Hsu, Tzong-Sun Wu. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy

Volume 22, Issue 4

270 -- 272E. Eugene Schultz. Why can t Microsoft stay out of the InfoSec headlines?
273 -- 283E. Eugene Schultz. Attackers hit Web hosting servers
284 -- 288Stephen Hinde. Careless about privacy
289 -- 291Hank Wolfe. Evidence analysis
292 -- 298Marcus K. Rogers. The role of criminal profiling in the computer forensics process
299 -- 307H. S. Venter, Jan H. P. Eloff. A taxonomy for information security technologies
308 -- 313James M. Anderson. Why we need a new definition of information security
316 -- 321Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Methods for preventing unauthorized software distribution
322 -- 336Neelam Bhalla. Is the mouse click mighty enough to bring society to its knees?

Volume 22, Issue 3

174 -- 175. From the editor-in-chief: Virus and worm trends
176 -- 187E. Eugene Schultz. Security views
188 -- 192Stephen Hinde. Cyber-terrorism in context
193 -- 195Hank Wolfe. Evidence acquisition
196 -- 203Hassan Aljifri, Diego Sánchez Navarro. International legal aspects of cryptography: Understanding cryptography
204 -- 206Rolf Moulton, Robert S. Coles. A contest to evaluate IT security services management
207 -- 211Chris Pounder. Governments act to improve security
214 -- 232Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen. Analysis of vulnerabilities in Internet firewalls
233 -- 244Helen van de Haar, Rossouw von Solms. A model for deriving information security control attribute profiles
245 -- 255Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang. Generalization of proxy signature-based on discrete logarithms
256 -- 264Phillip J. Brooke, Richard F. Paige. Fault trees for security system design and analysis

Volume 22, Issue 2

78 -- 79E. Eugene Schultz. Internet security: what s in the future?
80 -- 89E. Eugene Schultz. Security Views
90 -- 95Stephen Hinde. The law, cybercrime, risk assessment and cyber protection
96 -- 98Henry B. Wolfe. The circumstances of seizure
115 -- 118Chris Pounder. Security with unfortunate side effect
124 -- 127August Bequai. Safeguards for IT managers and staff under the Sarbanes-Oxley Act
136 -- 151Hassan Aljifri, Marcel Smets, Alexander P. Pons. IP Traceback using header compression
152 -- 159Jesper M. Johansson, E. Eugene Schultz. Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions
160 -- 166Chin-Chen Chang, Yeu-Pong Lai. A flexible date-attachment scheme on e-cash

Volume 22, Issue 1

4 -- 13E. Eugene Schultz. Security views
14 -- 21Stephen Hinde. Time cost money
22 -- 25Fred Piper. Reseacrh in cryptography and security mechanisms
26 -- 28Henry B. Wolfe. Computer forensics
29 -- 33Jon David. Security in a Flash
34 -- 37Chris Pounder. A tangled Web of libel lies?
41 -- 42Mark Fisher. LIRVA virus
45 -- 55Sung-Bae Cho, Hyuk-Jang Park. Efficient anomaly detection by modeling privilege flows using hidden Markov model
56 -- 67Danilo Bruschi, A. Curti, Emilia Rosti. A quantitative study of Public Key Infrastructures
68 -- 72Chun-Li Lin, Tzonelih Hwang. A password authentication scheme with secure password updating