Journal: Computers & Security

Volume 5, Issue 4

277 -- 278Harold Joseph Highland. In this issue ..
290 -- 295William T. Tener. Detection of control deterioration using decision support systems
296 -- 308Linda S. Rutledge, Lance J. Hoffman. A survey of issues in computer network security
309 -- 313Philip M. Stanley. Computer crime investigation and investigators
314 -- 324Paul A. Karger. Authentication and discretionary access control in computer networks
325 -- 327Ivan Ekebrink. Data security in terminalized system
328 -- 335Vangalur S. Alagar. A human approach to the technological challenges in data security
336 -- 339Gerald E. Murine. Secure software's impact on reliability
340 -- 343Harold Joseph Highland. How to modify a microcomputer operating system for added security
344 -- 346Hilmi Erdem. Host cryptographic operations: A software implementation
347 -- 349Patrick Leahy. Privacy and progress

Volume 5, Issue 3

179 -- 180Harold Joseph Highland. In this issue ..
181 -- 184Harold Joseph Highland, Viiveke Fåk. Electromagnetic radiation revisited, part II
193 -- 200Charles Cresson Wood. Establishing internal technical systems security standards
201 -- 206John G. Beatson. Managing the EDP audit and security functions
207 -- 210Roy Martin Richards Jr.. Insuring computer risks
211 -- 217Lance J. Hoffman, Lucy M. Moran. Societal vulnerability to computer system failures
218 -- 242Frederick G. Tompkins, Russell S. Rice. Integrating security activities into the software development life cycle and the software quality assurance process
243 -- 250G. M. J. Pluimakers, J. van Leeuwen. Authentication: A concise survey
251 -- 256Yeheskel Lapid, Niv Ahituv, Seev Neumann. Approaches to handling "Trojan Horse" threats

Volume 5, Issue 2

83 -- 0Harold Joseph Highland. In this issue..
84 -- 0Johan Essén. New member of the International Board of Editors
85 -- 93Harold Joseph Highland. Electromagnetic radiation revisited
101 -- 113Willis H. Ware. Emerging privacy issues
114 -- 121Charles Cresson Wood, Howard M. Zeidler. Security modules: Potent information security system components
122 -- 127L. Hoebeke. Computer security - Prevention: Lessons from the operation of a nuclear power plant
128 -- 134Rick F. van der Lans. Data security in a relational database environment
135 -- 140Roy Martin Richards Jr., Jan Yestingsmeier. Risk management - a key to security in the electronic funds transfer system
141 -- 144Matt Bishop. A pauper's callback scheme
145 -- 149Cees J. A. Jansen. On the key storage requirements for secure terminals
167 -- 0June M. Power, Steve R. Wilbur. Authentication in a heterogeneous environment
167 -- 0Willis H. Ware. Emerging privacy issues
167 -- 0Viiveke Fåk. Software versus hardware encryption - Is there any difference today?
167 -- 0Frederick G. Tompkins, Russel S. Rice. Intergrating security activities into the software development life cycle and the software quality assurance process
167 -- 168T. K. Worthington, J. J. Chainer, J. D. Willford, S. C. Gunderson. IBM dynamic signature verification
167 -- 0John M. Carroll, Helmut Jürgensen. Design of a secure relational data base
168 -- 0John G. Beatson. Development and organization of the audit and security functions
168 -- 0Roger T. Doswell. The audit, control and security of the project life cycle - Pre-implementation stage
168 -- 0Peter P. C. H. Kingston, Martin Goulbourn. Security for small business computers
168 -- 169Philip M. Stanley. Educating computer crime investigators
168 -- 0William T. Tener. Decision support systems - A necessity for effective auditing of controls
168 -- 0Ivan Ekerbrink. Security of electronic transactions
168 -- 0Hans-Jürgen Kugler. Concepts of protection in the IFIP WG 2.7 reference model for command and response languages
169 -- 0Gerald E. Murine. Producing reliable, secure software
169 -- 0Donald W. Davies. How to use the DES safely
169 -- 0Charles Cresson Wood. Establishing technical systems security standards at a large multinational bank

Volume 5, Issue 1

1 -- 0Harold Joseph Highland. In this issue..
11 -- 16Bernard P. Zajac Jr.. What to do when you have reason to believe your computer has been compromised
17 -- 23A. Kinnon, Robert H. Davis. Audit and security implications of electronic funds transfer
24 -- 27Ted Goeltz. Why not DES?
28 -- 35Robert M. Harper Jr.. Internal control in local area networks: An accountant's perspective
36 -- 45R. van den Assem, W. J. van Elk. A chosen-plaintext attack on the microsoft BASIC protection
46 -- 54Ronald Paans, I. S. Herschberg. How to control MVS user supervisor calls
68 -- 72Kenneth Owen. Computer security: IFIP addresses the practical issues
74 -- 79Per L. Hoving. System security: The technical challenge