Journal: Computers & Security

Volume 3, Issue 4

257 -- 0Harold Joseph Highland. Editorial
259 -- 261Ronald Paans. Computer security and EDP-auditing: The twin guards
263 -- 272I. S. Herschberg, Ronald Paans. The programmer's threat: Cases and causes
273 -- 277F. Buurmeijer. IBM's data security strategy: Some implementation aspects
278 -- 285Ronald Paans, I. S. Herschberg. A topology for secure MVS systems
286 -- 294C. P. Louwerse, J. M. L. Kouwenberg. Data protection aspects in an integrated hospital information system
295 -- 302W. R. C. van Hoboken. The burglar's viewpoint
303 -- 313R. Toppen. Infinite confidence: 'The audit of data communication networks'
314 -- 322A. J. van de Goor. Effects of technical developments on system security
323 -- 324Ronald Paans. ECOMA-12 European computer measurement association conference : Special interest group on performance aspects of computer security

Volume 3, Issue 3

169 -- 170Harold Joseph Highland. Editorial
171 -- 185Bram van den Berg, Hans Leenaars. Advanced topics of a computer center audit
186 -- 195Ben F. Barton, Marthalee S. Barton. User-friendly password methods for computer-mediated information systems
196 -- 214Mariagrazia Fugini, Giancarlo Martella. ACTEN: A conceptual model for security systems design
215 -- 224Chadwick H. Nestman, John C. Windsor, Mary C. Hinson. Tutorial on telecommunications and security
225 -- 228Richard I. Polis. Information security: Reality and fiction
229 -- 233Warren W. Fisher. Cryptography for computer security: Making the decision
234 -- 236Lothar Krause. Data encryption in ISO, the International Organization for Standardization

Volume 3, Issue 2

77 -- 79Harold Joseph Highland. Editorial
81 -- 91Donn B. Parker. Safeguards selection principles
93 -- 99Rolf T. Moulton. A practical approach to system security devices
101 -- 116Arthur Sorkin, C. James Buchanan. Measurement of cryptographic capability protection algorithms
117 -- 121Ilias Kaperonis. Industrial espionage
123 -- 134Morrison Bump Jr.. A primer on software piracy cases in the courts
140 -- 142Charles Cresson Wood. Securicom '84

Volume 3, Issue 1

3 -- 7Rolf Moulton. Data security is a management responsibility
9 -- 19Harvey S. Koch. Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation
21 -- 28James A. Schweitzer. Personal workstation automation security vulnerabilities
29 -- 34Ruth A. Seif. Contingency planning in the banking community
35 -- 41Arthur E. Oldehoeft, Robert McDonald. A software scheme for user-controlled file encryption
43 -- 44Sig Porter. Cryptology and number sequences: Pseudorandom, random, and perfectly random
45 -- 47Albert A. Mullin. A note on the mathematics of public-key cryptosystems
53 -- 55Michael Comer. Computer crime needs international countermeasures