Journal: Computers & Security

Volume 7, Issue 6

532 -- 0Harold Joseph Highland. From the editor
533 -- 541Harold Joseph Highland. Random bits & bytes
543 -- 547Cliff Stoll. How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers
549 -- 552Belden Menkus. Understanding password compromise
553 -- 556Jack Bologna. Soviet white-collar crime and criminal justice
559 -- 562Jan H. P. Eloff. Computer security policy: Important issues
563 -- 573John M. Carroll. Implementing multilevel security by violation privilege
599 -- 605Ravinderpal Singh Sandhu. Nested categories for access control
609 -- 615. Abstracts of recent articles and literature

Volume 7, Issue 5

438 -- 0Harold Joseph Highland. From the editor
439 -- 0Harold Joseph Highland. Write-protect tab warning
439 -- 0Harold Joseph Highland. U.S. Congress computer virus report
440 -- 0Harold Joseph Highland. Virus filter evaluation
441 -- 442Harold Joseph Highland. Virus filter update
442 -- 450Harold Joseph Highland. Computer viruses: Media hyperbole, errors and ignorance
451 -- 453Raymond M. Glath. The case of the "Gerbil virus" that wasn't
455 -- 465Charles Cresson Wood. A context for information systems security planning
467 -- 469Jim Schweitzer. Security news briefs
471 -- 472Bernard P. Zajac Jr.. Viruses: Should we quit talking about them?
475 -- 481John M. Carroll, Robert B. Mowat, Lynda E. Robbins, David Wiseman. The password predictor - a training aid for raising security awareness
483 -- 488Chris J. Mitchell, Michael Walker. Solutions to the multidestination secure electronic mail problem
489 -- 494Fred Cohen. Maintaining a poor person's information integrity
495 -- 502Charles P. Pfleeger, Shari Lawrence Pfleeger. A transaction flow approach to software security certification for document handling systems
503 -- 505Yue Jiang Huang, Fred Cohen. Some weak points of one fast cryptographic checksum algorithm and its improvement
509 -- 520. Abstracts of recent articles and literature
521 -- 529. Abstracts of recent articles and literature

Volume 7, Issue 4

334 -- 0Harold Joseph Highland. From the editor
335 -- 336Frederick Cohen. Ethical issues in computer virus distribution
337 -- 0Harold Joseph Highland. How to obtain a computer virus
338 -- 0Harold Joseph Highland. Are virus attack statistics reliable?
339 -- 0Harold Joseph Highland. Hackers revisited
340 -- 0Harold Joseph Highland. New video terminal law
341 -- 0Harold Joseph Highland. Electromagnetic eavesdropping machines for christmas?
344 -- 0Harold Joseph Highland. Tips on terrorism
344 -- 345Harold Joseph Highland. Investigating a reported virus attack
345 -- 0Harold Joseph Highland. Virus filter update
347 -- 352C. Wayne Madsen. The world meganetwork and terrorism
353 -- 355Jack Bologna. Selection risks in hiring information systems personnel
357 -- 360Harold Joseph Highland. The anatomy of a DOS Disk
361 -- 366Belden Menkus. U.S. Government agencies belatedly address information system security issues
367 -- 370Harold Joseph Highland. The brain virus: Fact and fantasy
373 -- 385Rita C. Summers, Stanley A. Kurzban. Potential applications of knowledge-based methods to computer security
387 -- 396John McHugh, Bhavani M. Thuraisingham. Multilevel security issues in distributed database management systems
397 -- 408Ian H. Witten, John G. Cleary. On the privacy afforded by adaptive text compression
409 -- 414Fred Cohen, Stephen Bruhns. Two secure file servers
423 -- 434. Abstracts of recent articles and literature

Volume 7, Issue 3

228 -- 0Harold Joseph Highlands. From the editor
232 -- 233Harold Joseph Highland. Open Sesame-Hackers welcome
233 -- 235Harold Joseph Highland. Security director's dilemma
235 -- 237Harold Joseph Highland. How to test a virus filter without a virus
237 -- 239Harold Joseph Highland. Blitzed by a computer virus
237 -- 0Harold Joseph Highland. Virus disaster red book
239 -- 242Harold Joseph Highland. Special virus protection measures
242 -- 243Harold Joseph Highland. Upcoming conferences of note
243 -- 244Harold Joseph Highland. Star wars security or where did those micros go?
245 -- 247Jack Bologna. Managing an information system crisis
249 -- 250Bernard P. Zajac Jr.. Distributed data processing: New problems
251 -- 253G. Will Milor. The computer security act of 1987
255 -- 258Jon David. Treating viral fever
261 -- 268Belden Menkus. Breakpoints
271 -- 277Margaret E. van Biene-Hershey. The technical EDP-audit function
279 -- 286Fred Cohen. Designing provably correct information networks with digital diodes
287 -- 298G. M. J. Pluimakers. Some notes on authorization and transaction management in distributed database systems
299 -- 303Dirk Van der Bank, Edwin Anderssen. Cryptographic figures of merit
309 -- 311Harold Joseph Highland. Report on the fourth national computer security conference: COMPSEC IV
312 -- 315Ronald Paans. The second European conference on computer audit, control and security
320 -- 331. Abstracts of recent articles and literature

Volume 7, Issue 2

114 -- 0Harold Joseph Highland. From the editor
129 -- 130William A. J. Bound. Discussing security with top management
131 -- 132Bernard P. Zajac Jr.. Personnel: The other half of data security
132 -- 136Belden Menkus. Understanding the use of passwords
137 -- 138G. J. Bologna. Pitfalls in measuring MIS performance
139 -- 145William Hugh Murray. The application of epidemiology to computer viruses
145 -- 150Harold Joseph Highland. Anatomy of a virus attack
151 -- 155Viiveke Fåk. Are we vulnerable to a virus attack? A report from Sweden
157 -- 161Harold Joseph Highland. An overview of 18 virus protection products
157 -- 0Harold Joseph Highland. How to combat a computer virus
167 -- 184Fred Cohen. On the implications of computer viruses and methods of defense
185 -- 195Detmar W. Straub Jr.. Organizational structuring of the computer security function
197 -- 203I. S. Herschberg. Make the tigers hunt for you
213 -- 223. Abstracts of recent articles and literature

Volume 7, Issue 1

3 -- 5Harold Joseph Highland. Case history of a virus attack
5 -- 6Harold Joseph Highland. Encryption, attacks and ethics
6 -- 7Harold Joseph Highland. How to protect a microcomputer system
7 -- 9Harold Joseph Highland. Chernobyl computer communications
9 -- 10Harold Joseph Highland. Electromagnetic interference
10 -- 0Harold Joseph Highland. IFIP/Sec '88
10 -- 11Harold Joseph Highland. For your information
13 -- 18Harold Joseph Highland. Product reviews
19 -- 23Robert H. Courtney Jr.. Another perspective on sensitive but unclassified data
25 -- 26Harold Joseph Highland. How secure are fiber optics communications?
27 -- 34Harold Joseph Highland. Secretdisk II - transparent automatic encryption
35 -- 36Bernard P. Zajac Jr.. Dial-up communication lines: Can they be secured?
37 -- 43Harold Joseph Highland. Program aids for office automation security
47 -- 52Belden Menkus. Getting started in data processing disaster recovery
53 -- 57Ellen Amsel. Network security and access controls
59 -- 63Niv Ahituv, Yeheskel Lapid, Seev Neumann. Protecting statistical databases against retrieval of private information
65 -- 71Per Christoffersson. Message authentication and encryption combined
73 -- 82Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley. Element-level classification with A1 assurance
83 -- 87Arto Salomaa. A public-key cryptosystem based on language theory
101 -- 110. Abstracts of recent articles and literature