researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
6
, Issue
6
445
--
446
Harold Joseph Highland
.
From the editor
447
--
0
Harold Joseph Highland
.
New member of the International Board of Editors
448
--
0
Harold Joseph Highland
.
Computer abuse and managerial response
449
--
451
Harold Joseph Highland
.
Data cartridge for secure data
451
--
452
Harold Joseph Highland
.
Passwords revisited
452
--
457
Harold Joseph Highland
.
Office automation security
457
--
458
Harold Joseph Highland
.
Tempest over leaking computers
458
--
462
Harold Joseph Highland
.
Hard disk recovery tools
463
--
0
Harold Joseph Highland
.
Random notes
464
--
470
Sidney L. Smith
.
Authenticating users by word association
471
--
478
Bruce J. Baird
,
Lindsay L. Baird Jr.
,
Ronald P. Ranauro
.
The moral cracker?
479
--
492
Bhavani M. Thuraisingham
.
Security checking in relational database management systems augmented with inference engines
493
--
504
Sergio B. Guarro
.
Principles and procedures of the LRAM approach to information systems risk analysis and management
505
--
510
Fred Cohen
.
A cryptographic checksum for integrity protection
511
--
516
Charles Cresson Wood
.
The human immune system as an information systems security reference model
Volume
6
, Issue
5
365
--
367
Harold Joseph Highland
.
From the editor
368
--
370
Harold Joseph Highland
.
Secure fax transmission
385
--
395
J.-C. Spender
.
Identifying computer users with authentication devices (tokens)
396
--
402
C. Fernández
,
A. Vaquero
,
J. M. Troya
,
J. M. Sánchez
.
Automating the computation of authenticators for interbank telex messages
403
--
416
Ronald Paans
,
I. S. Herschberg
.
Computer security: The long road ahead
417
--
425
Gerald V. Post
.
Improving operating system security
Volume
6
, Issue
4
285
--
287
Harold Joseph Highland
.
From the editor..
288
--
295
Harold Joseph Highland
.
Would you report a suspected data crime to the authorities?
300
--
313
John M. Carroll
.
Strategies for extending the useful lifetime of DES
314
--
320
Charles Cresson Wood
.
Information systems security: Management success factors
321
--
331
Maria M. Pozzo
,
Terence E. Gray
.
An approach to containing computer viruses
332
--
338
Fred Cohen
.
Design and protection of an information network under a partial ordering: A case study
339
--
341
Chris J. Mitchell
,
Fred Piper
.
The cost of reducing key-storage requirements in secure networks
342
--
350
Achim Jung
.
Implementing the RSA cryptosystem
351
--
0
Viiveke Fåk
.
Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4
Volume
6
, Issue
3
193
--
194
Harold Joseph Highland
.
From the editor
195
--
196
Harold Joseph Highland
.
Data encryption standard II?
196
--
198
Harold Joseph Highland
.
Report from Beijing
198
--
199
Harold Joseph Highland
.
Information sources
199
--
202
Harold Joseph Highland
.
Encryption package
202
--
203
Harold Joseph Highland
.
US data controls
203
--
205
Harold Joseph Highland
.
Computer security and law
205
--
0
Harold Joseph Highland
.
Cipher cracking
206
--
218
Karl Rihaczek
.
TeleTrusT-OSIS and communication security
219
--
228
Fred Cohen
.
Design and administration of distributed and hierarchical information networks under partial orderings
229
--
244
Harold Joseph Highland
.
How to evaluate microcomputer encryption software and hardware
252
--
260
P. Dwyer
,
George D. Jelatis
,
Bhavani M. Thuraisingham
.
Multilevel Security in Database Management Systems
252
--
260
Richard J. Johnstone
.
Key updating flags in EFT-POS security systems
261
--
268
Philippe Van Heurck
.
TRASEC: Belgian security system for electronic funds transfers
Volume
6
, Issue
2
97
--
98
Harold Joseph Highland
.
In this issue..
99
--
100
Harold Joseph Highland
.
How secure are your encryption keys?
100
--
101
Harold Joseph Highland
.
The DES revisited - Part II
102
--
103
Harold Joseph Highland
.
Computer security: A new focus at the National Bureau of Standards
103
--
108
Harold Joseph Highland
.
Technology watch
108
--
109
Harold Joseph Highland
.
The charade of computer security
109
--
110
Harold Joseph Highland
.
Random notes and reports
111
--
117
Juhani Saari
.
Computer crime - numbers lie
118
--
128
Fred Cohe
.
Protection and administration of information networks with partial orderings
129
--
132
James A. Schweitzer
.
How security fits in - a management view: Security is an essential for quality information
133
--
138
I. S. Herschberg
.
The hackers' comfort
139
--
151
Tung Bui
,
Taracad R. Sivasankaran
.
Cost-effectiveness modeling for a decision support system in computer security
152
--
157
Niv Ahituv
,
Yeheskel Lapid
,
Seev Neumann
.
Verifying the authentication of an information system user
158
--
166
Andreas Pfitzmann
,
Michael Waidner
.
Networks without user observability
167
--
171
Ronald Paans
.
IFIP/Sec'86: Information security: The challenge
172
--
0
Ronald Paans
.
ECOMA-14
173
--
176
Ronald Paans
.
First European Conference on Computer Audit, Control & Security
177
--
179
J. A. N. Lee
,
Gerald Segal
.
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking
Volume
6
, Issue
1
1
--
3
Harold Joseph Highland
.
In this issue..
8
--
10
Harold Joseph Highland
.
Computer viruses and sudden death!
17
--
21
Rolf T. Moulton
.
How to supervise and control I/S Security Officers and Auditors
22
--
35
Fred Cohen
.
Computer viruses: Theory and experiments
36
--
40
Viiveke Fåk
.
Crypto management made manageable - Demands on crypto equipment design
41
--
48
June M. Power
,
Steve R. Wilbur
.
Authentication in a heterogeneous environment
49
--
53
Artur Solarz
.
Computer-related embezzlement
54
--
67
Dennis Longley
.
Expert systems applied to the analysis of key management schemes
68
--
72
Peter P. C. H. Kingston
,
Martin Goulbourn
.
Security for microcomputers used in small business
73
--
79
Harold Joseph Highland
.
Data physician - A virus protection program