Journal: Computers & Security

Volume 4, Issue 4

267 -- 268Harold Joseph Highland. Editorial
269 -- 286Wim van Eck. Electromagnetic radiation from video display units: An eavesdropping risk?
287 -- 295Ken Wong. Computer crime - Risk management and computer security
297 -- 308Józef P. Pieprzyk, Dominik Rutkowski. Design of public key cryptosystems using idempotent elements
309 -- 315Pieter de Bruyne. Signature verification using holistic measures
317 -- 323A. J. du Croix. Data sharing and access protection in business system 12
325 -- 341Victor L. Voydock, Stephen T. Kent. Security mechanisms in a transport layer protocol

Volume 4, Issue 3

185 -- 186Harold Joseph Highland. Editorial : Office automation or on the value of being a dinosaur
189 -- 205Fred Cohen. A secure computer network design
207 -- 210Jean-Pierre Chamoux. Data security and confidentiality in Europe
211 -- 218Józef P. Pieprzyk, Dominik Rutkowski. Modular design of information encipherment for computer systems
219 -- 222Belden Menkus. The impact of the Bell system breakup on DP disaster recovery planning
223 -- 228Charles Cresson Wood. Floppy diskette security measures
245 -- 246Harold Joseph Highland. U.S. computer crime legislation highlighted in special report
247 -- 248Harold Joseph Highland. Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95
247 -- 0Harold Joseph Highland. Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95
248 -- 249Charles Cresson Wood. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50
249 -- 0Harold Joseph Highland. Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25
249 -- 0Esther Harris Highland. Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ US $28.75
249 -- 250Esther Harris Highland. Proceedings of the seventh computer security group conference : Washington: US government printing office, 1984 - 776-101/1027. 115 pages

Volume 4, Issue 2

101 -- 102Harold Joseph Highland. Editorial
103 -- 107Isaac L. Auerbach. Professional responsibility for information privacy
109 -- 122Gee Kin Yeo. Incorporating access control in forms systems
123 -- 134Harold Joseph Highland. Microcomputer security: Data protection techniques
135 -- 138Belden Menkus. The EDP auditor's role in computer security
139 -- 141James E. Miller. Transaction controls: Steps to take after the equipment has been secured
143 -- 147Jan H. P. Eloff. The development of a specification language for a computer security system
149 -- 152Per L. Hoving, Johan Essén. Minutes from the first meeting of TC 11, security and protection in information processing systems

Volume 4, Issue 1

1 -- 2Harold Joseph Highland. Editorial
5 -- 12John M. Carroll, W. R. Mac Iver. COSSAC: a framework for analyzing and configuring secure computer facilities
13 -- 22James A. Schweitzer. A management view: computer security as a discretionary decision
23 -- 32Graham Gal, William E. McCarthy. Specification of internal accounting controls in a database environment
33 -- 45Michael J. Cerullo. General controls in computer systems
47 -- 64Stephen C. Serpell. Cryptographic equipment security: a code of practice
65 -- 73Harold Joseph Highland. The first national computer security conference