researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
3
, Issue
4
257
--
0
Harold Joseph Highland
.
Editorial
259
--
261
Ronald Paans
.
Computer security and EDP-auditing: The twin guards
263
--
272
I. S. Herschberg
,
Ronald Paans
.
The programmer's threat: Cases and causes
273
--
277
F. Buurmeijer
.
IBM's data security strategy: Some implementation aspects
278
--
285
Ronald Paans
,
I. S. Herschberg
.
A topology for secure MVS systems
286
--
294
C. P. Louwerse
,
J. M. L. Kouwenberg
.
Data protection aspects in an integrated hospital information system
295
--
302
W. R. C. van Hoboken
.
The burglar's viewpoint
303
--
313
R. Toppen
.
Infinite confidence: 'The audit of data communication networks'
314
--
322
A. J. van de Goor
.
Effects of technical developments on system security
323
--
324
Ronald Paans
.
ECOMA-12 European computer measurement association conference : Special interest group on performance aspects of computer security
Volume
3
, Issue
3
169
--
170
Harold Joseph Highland
.
Editorial
171
--
185
Bram van den Berg
,
Hans Leenaars
.
Advanced topics of a computer center audit
186
--
195
Ben F. Barton
,
Marthalee S. Barton
.
User-friendly password methods for computer-mediated information systems
196
--
214
Mariagrazia Fugini
,
Giancarlo Martella
.
ACTEN: A conceptual model for security systems design
215
--
224
Chadwick H. Nestman
,
John C. Windsor
,
Mary C. Hinson
.
Tutorial on telecommunications and security
225
--
228
Richard I. Polis
.
Information security: Reality and fiction
229
--
233
Warren W. Fisher
.
Cryptography for computer security: Making the decision
234
--
236
Lothar Krause
.
Data encryption in ISO, the International Organization for Standardization
Volume
3
, Issue
2
77
--
79
Harold Joseph Highland
.
Editorial
81
--
91
Donn B. Parker
.
Safeguards selection principles
93
--
99
Rolf T. Moulton
.
A practical approach to system security devices
101
--
116
Arthur Sorkin
,
C. James Buchanan
.
Measurement of cryptographic capability protection algorithms
117
--
121
Ilias Kaperonis
.
Industrial espionage
123
--
134
Morrison Bump Jr.
.
A primer on software piracy cases in the courts
140
--
142
Charles Cresson Wood
.
Securicom '84
Volume
3
, Issue
1
3
--
7
Rolf Moulton
.
Data security is a management responsibility
9
--
19
Harvey S. Koch
.
Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation
21
--
28
James A. Schweitzer
.
Personal workstation automation security vulnerabilities
29
--
34
Ruth A. Seif
.
Contingency planning in the banking community
35
--
41
Arthur E. Oldehoeft
,
Robert McDonald
.
A software scheme for user-controlled file encryption
43
--
44
Sig Porter
.
Cryptology and number sequences: Pseudorandom, random, and perfectly random
45
--
47
Albert A. Mullin
.
A note on the mathematics of public-key cryptosystems
53
--
55
Michael Comer
.
Computer crime needs international countermeasures