researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
7
, Issue
6
532
--
0
Harold Joseph Highland
.
From the editor
533
--
541
Harold Joseph Highland
.
Random bits & bytes
543
--
547
Cliff Stoll
.
How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers
549
--
552
Belden Menkus
.
Understanding password compromise
553
--
556
Jack Bologna
.
Soviet white-collar crime and criminal justice
559
--
562
Jan H. P. Eloff
.
Computer security policy: Important issues
563
--
573
John M. Carroll
.
Implementing multilevel security by violation privilege
599
--
605
Ravinderpal Singh Sandhu
.
Nested categories for access control
609
--
615
.
Abstracts of recent articles and literature
Volume
7
, Issue
5
438
--
0
Harold Joseph Highland
.
From the editor
439
--
0
Harold Joseph Highland
.
Write-protect tab warning
439
--
0
Harold Joseph Highland
.
U.S. Congress computer virus report
440
--
0
Harold Joseph Highland
.
Virus filter evaluation
441
--
442
Harold Joseph Highland
.
Virus filter update
442
--
450
Harold Joseph Highland
.
Computer viruses: Media hyperbole, errors and ignorance
451
--
453
Raymond M. Glath
.
The case of the "Gerbil virus" that wasn't
455
--
465
Charles Cresson Wood
.
A context for information systems security planning
467
--
469
Jim Schweitzer
.
Security news briefs
471
--
472
Bernard P. Zajac Jr.
.
Viruses: Should we quit talking about them?
475
--
481
John M. Carroll
,
Robert B. Mowat
,
Lynda E. Robbins
,
David Wiseman
.
The password predictor - a training aid for raising security awareness
483
--
488
Chris J. Mitchell
,
Michael Walker
.
Solutions to the multidestination secure electronic mail problem
489
--
494
Fred Cohen
.
Maintaining a poor person's information integrity
495
--
502
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
.
A transaction flow approach to software security certification for document handling systems
503
--
505
Yue Jiang Huang
,
Fred Cohen
.
Some weak points of one fast cryptographic checksum algorithm and its improvement
509
--
520
.
Abstracts of recent articles and literature
521
--
529
.
Abstracts of recent articles and literature
Volume
7
, Issue
4
334
--
0
Harold Joseph Highland
.
From the editor
335
--
336
Frederick Cohen
.
Ethical issues in computer virus distribution
337
--
0
Harold Joseph Highland
.
How to obtain a computer virus
338
--
0
Harold Joseph Highland
.
Are virus attack statistics reliable?
339
--
0
Harold Joseph Highland
.
Hackers revisited
340
--
0
Harold Joseph Highland
.
New video terminal law
341
--
0
Harold Joseph Highland
.
Electromagnetic eavesdropping machines for christmas?
344
--
0
Harold Joseph Highland
.
Tips on terrorism
344
--
345
Harold Joseph Highland
.
Investigating a reported virus attack
345
--
0
Harold Joseph Highland
.
Virus filter update
347
--
352
C. Wayne Madsen
.
The world meganetwork and terrorism
353
--
355
Jack Bologna
.
Selection risks in hiring information systems personnel
357
--
360
Harold Joseph Highland
.
The anatomy of a DOS Disk
361
--
366
Belden Menkus
.
U.S. Government agencies belatedly address information system security issues
367
--
370
Harold Joseph Highland
.
The brain virus: Fact and fantasy
373
--
385
Rita C. Summers
,
Stanley A. Kurzban
.
Potential applications of knowledge-based methods to computer security
387
--
396
John McHugh
,
Bhavani M. Thuraisingham
.
Multilevel security issues in distributed database management systems
397
--
408
Ian H. Witten
,
John G. Cleary
.
On the privacy afforded by adaptive text compression
409
--
414
Fred Cohen
,
Stephen Bruhns
.
Two secure file servers
423
--
434
.
Abstracts of recent articles and literature
Volume
7
, Issue
3
228
--
0
Harold Joseph Highlands
.
From the editor
232
--
233
Harold Joseph Highland
.
Open Sesame-Hackers welcome
233
--
235
Harold Joseph Highland
.
Security director's dilemma
235
--
237
Harold Joseph Highland
.
How to test a virus filter without a virus
237
--
239
Harold Joseph Highland
.
Blitzed by a computer virus
237
--
0
Harold Joseph Highland
.
Virus disaster red book
239
--
242
Harold Joseph Highland
.
Special virus protection measures
242
--
243
Harold Joseph Highland
.
Upcoming conferences of note
243
--
244
Harold Joseph Highland
.
Star wars security or where did those micros go?
245
--
247
Jack Bologna
.
Managing an information system crisis
249
--
250
Bernard P. Zajac Jr.
.
Distributed data processing: New problems
251
--
253
G. Will Milor
.
The computer security act of 1987
255
--
258
Jon David
.
Treating viral fever
261
--
268
Belden Menkus
.
Breakpoints
271
--
277
Margaret E. van Biene-Hershey
.
The technical EDP-audit function
279
--
286
Fred Cohen
.
Designing provably correct information networks with digital diodes
287
--
298
G. M. J. Pluimakers
.
Some notes on authorization and transaction management in distributed database systems
299
--
303
Dirk Van der Bank
,
Edwin Anderssen
.
Cryptographic figures of merit
309
--
311
Harold Joseph Highland
.
Report on the fourth national computer security conference: COMPSEC IV
312
--
315
Ronald Paans
.
The second European conference on computer audit, control and security
320
--
331
.
Abstracts of recent articles and literature
Volume
7
, Issue
2
114
--
0
Harold Joseph Highland
.
From the editor
129
--
130
William A. J. Bound
.
Discussing security with top management
131
--
132
Bernard P. Zajac Jr.
.
Personnel: The other half of data security
132
--
136
Belden Menkus
.
Understanding the use of passwords
137
--
138
G. J. Bologna
.
Pitfalls in measuring MIS performance
139
--
145
William Hugh Murray
.
The application of epidemiology to computer viruses
145
--
150
Harold Joseph Highland
.
Anatomy of a virus attack
151
--
155
Viiveke Fåk
.
Are we vulnerable to a virus attack? A report from Sweden
157
--
161
Harold Joseph Highland
.
An overview of 18 virus protection products
157
--
0
Harold Joseph Highland
.
How to combat a computer virus
167
--
184
Fred Cohen
.
On the implications of computer viruses and methods of defense
185
--
195
Detmar W. Straub Jr.
.
Organizational structuring of the computer security function
197
--
203
I. S. Herschberg
.
Make the tigers hunt for you
213
--
223
.
Abstracts of recent articles and literature
Volume
7
, Issue
1
3
--
5
Harold Joseph Highland
.
Case history of a virus attack
5
--
6
Harold Joseph Highland
.
Encryption, attacks and ethics
6
--
7
Harold Joseph Highland
.
How to protect a microcomputer system
7
--
9
Harold Joseph Highland
.
Chernobyl computer communications
9
--
10
Harold Joseph Highland
.
Electromagnetic interference
10
--
0
Harold Joseph Highland
.
IFIP/Sec '88
10
--
11
Harold Joseph Highland
.
For your information
13
--
18
Harold Joseph Highland
.
Product reviews
19
--
23
Robert H. Courtney Jr.
.
Another perspective on sensitive but unclassified data
25
--
26
Harold Joseph Highland
.
How secure are fiber optics communications?
27
--
34
Harold Joseph Highland
.
Secretdisk II - transparent automatic encryption
35
--
36
Bernard P. Zajac Jr.
.
Dial-up communication lines: Can they be secured?
37
--
43
Harold Joseph Highland
.
Program aids for office automation security
47
--
52
Belden Menkus
.
Getting started in data processing disaster recovery
53
--
57
Ellen Amsel
.
Network security and access controls
59
--
63
Niv Ahituv
,
Yeheskel Lapid
,
Seev Neumann
.
Protecting statistical databases against retrieval of private information
65
--
71
Per Christoffersson
.
Message authentication and encryption combined
73
--
82
Teresa F. Lunt
,
Dorothy E. Denning
,
Roger R. Schell
,
Mark Heckman
,
William R. Shockley
.
Element-level classification with A1 assurance
83
--
87
Arto Salomaa
.
A public-key cryptosystem based on language theory
101
--
110
.
Abstracts of recent articles and literature