Journal: Computers & Security

Volume 6, Issue 6

445 -- 446Harold Joseph Highland. From the editor
447 -- 0Harold Joseph Highland. New member of the International Board of Editors
448 -- 0Harold Joseph Highland. Computer abuse and managerial response
449 -- 451Harold Joseph Highland. Data cartridge for secure data
451 -- 452Harold Joseph Highland. Passwords revisited
452 -- 457Harold Joseph Highland. Office automation security
457 -- 458Harold Joseph Highland. Tempest over leaking computers
458 -- 462Harold Joseph Highland. Hard disk recovery tools
463 -- 0Harold Joseph Highland. Random notes
464 -- 470Sidney L. Smith. Authenticating users by word association
471 -- 478Bruce J. Baird, Lindsay L. Baird Jr., Ronald P. Ranauro. The moral cracker?
479 -- 492Bhavani M. Thuraisingham. Security checking in relational database management systems augmented with inference engines
493 -- 504Sergio B. Guarro. Principles and procedures of the LRAM approach to information systems risk analysis and management
505 -- 510Fred Cohen. A cryptographic checksum for integrity protection
511 -- 516Charles Cresson Wood. The human immune system as an information systems security reference model

Volume 6, Issue 5

365 -- 367Harold Joseph Highland. From the editor
368 -- 370Harold Joseph Highland. Secure fax transmission
385 -- 395J.-C. Spender. Identifying computer users with authentication devices (tokens)
396 -- 402C. Fernández, A. Vaquero, J. M. Troya, J. M. Sánchez. Automating the computation of authenticators for interbank telex messages
403 -- 416Ronald Paans, I. S. Herschberg. Computer security: The long road ahead
417 -- 425Gerald V. Post. Improving operating system security

Volume 6, Issue 4

285 -- 287Harold Joseph Highland. From the editor..
288 -- 295Harold Joseph Highland. Would you report a suspected data crime to the authorities?
300 -- 313John M. Carroll. Strategies for extending the useful lifetime of DES
314 -- 320Charles Cresson Wood. Information systems security: Management success factors
321 -- 331Maria M. Pozzo, Terence E. Gray. An approach to containing computer viruses
332 -- 338Fred Cohen. Design and protection of an information network under a partial ordering: A case study
339 -- 341Chris J. Mitchell, Fred Piper. The cost of reducing key-storage requirements in secure networks
342 -- 350Achim Jung. Implementing the RSA cryptosystem
351 -- 0Viiveke Fåk. Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4

Volume 6, Issue 3

193 -- 194Harold Joseph Highland. From the editor
195 -- 196Harold Joseph Highland. Data encryption standard II?
196 -- 198Harold Joseph Highland. Report from Beijing
198 -- 199Harold Joseph Highland. Information sources
199 -- 202Harold Joseph Highland. Encryption package
202 -- 203Harold Joseph Highland. US data controls
203 -- 205Harold Joseph Highland. Computer security and law
205 -- 0Harold Joseph Highland. Cipher cracking
206 -- 218Karl Rihaczek. TeleTrusT-OSIS and communication security
219 -- 228Fred Cohen. Design and administration of distributed and hierarchical information networks under partial orderings
229 -- 244Harold Joseph Highland. How to evaluate microcomputer encryption software and hardware
252 -- 260P. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham. Multilevel Security in Database Management Systems
252 -- 260Richard J. Johnstone. Key updating flags in EFT-POS security systems
261 -- 268Philippe Van Heurck. TRASEC: Belgian security system for electronic funds transfers

Volume 6, Issue 2

97 -- 98Harold Joseph Highland. In this issue..
99 -- 100Harold Joseph Highland. How secure are your encryption keys?
100 -- 101Harold Joseph Highland. The DES revisited - Part II
102 -- 103Harold Joseph Highland. Computer security: A new focus at the National Bureau of Standards
103 -- 108Harold Joseph Highland. Technology watch
108 -- 109Harold Joseph Highland. The charade of computer security
109 -- 110Harold Joseph Highland. Random notes and reports
111 -- 117Juhani Saari. Computer crime - numbers lie
118 -- 128Fred Cohe. Protection and administration of information networks with partial orderings
129 -- 132James A. Schweitzer. How security fits in - a management view: Security is an essential for quality information
133 -- 138I. S. Herschberg. The hackers' comfort
139 -- 151Tung Bui, Taracad R. Sivasankaran. Cost-effectiveness modeling for a decision support system in computer security
152 -- 157Niv Ahituv, Yeheskel Lapid, Seev Neumann. Verifying the authentication of an information system user
158 -- 166Andreas Pfitzmann, Michael Waidner. Networks without user observability
167 -- 171Ronald Paans. IFIP/Sec'86: Information security: The challenge
172 -- 0Ronald Paans. ECOMA-14
173 -- 176Ronald Paans. First European Conference on Computer Audit, Control & Security
177 -- 179J. A. N. Lee, Gerald Segal. Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking

Volume 6, Issue 1

1 -- 3Harold Joseph Highland. In this issue..
8 -- 10Harold Joseph Highland. Computer viruses and sudden death!
17 -- 21Rolf T. Moulton. How to supervise and control I/S Security Officers and Auditors
22 -- 35Fred Cohen. Computer viruses: Theory and experiments
36 -- 40Viiveke Fåk. Crypto management made manageable - Demands on crypto equipment design
41 -- 48June M. Power, Steve R. Wilbur. Authentication in a heterogeneous environment
49 -- 53Artur Solarz. Computer-related embezzlement
54 -- 67Dennis Longley. Expert systems applied to the analysis of key management schemes
68 -- 72Peter P. C. H. Kingston, Martin Goulbourn. Security for microcomputers used in small business
73 -- 79Harold Joseph Highland. Data physician - A virus protection program