Journal: Computers & Security

Volume 8, Issue 8

644 -- 646Harold Joseph Highland. From the editor
647 -- 657Harold Joseph Highland. Random bits & bytes
659 -- 661Harold Joseph Highland. Datacrime virus and new anti-virus products
663 -- 668Charles Preston. Review of VIRUSCAN
669 -- 674Harold Joseph Highland. VCHECKER - a virus search program
675 -- 689David L. Jobusch, Arthur E. Oldehoeft. A survey of password mechanisms: Weaknesses and potential improvements. Part 2
693 -- 708Vijay Varadharajan. Verification of network security protocols
709 -- 720Raju Ramaswamy. Security architecture for data transfer through TCP/IP protocols
721 -- 730Bhavani M. Thuraisingham. A functional view of multilevel databases

Volume 8, Issue 7

553 -- 561Harold Joseph Highland. Random bits & bytes
563 -- 568Harold Joseph Highland. Secret disk II - administrator
581 -- 586Belden Menkus. Computer-related fire problems revisited
587 -- 604David L. Jobusch, Arthur E. Oldehoeft. A survey of password mechanisms: Weaknesses and potential improvements. Part 1
607 -- 611Khosrow Dehnad. A simple way of improving the login security
613 -- 620Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos. A methodology for penetration testing
621 -- 630Dieter Bong, Christoph Ruland. Optimized software implementations of the modular exponentiation on general purpose microprocessors

Volume 8, Issue 6

458 -- 459Harold Joseph Highland. From the editor
460 -- 478Harold Joseph Highland. Random bits & bytes
479 -- 485Phillip E. Gardner. Evaluation of five risk assessment programs
487 -- 492Belden Menkus. The employee s role in protecting information assets
495 -- 505C. L. Harrold. An introduction to the SMITE approach to secure computing
507 -- 516Raju Ramaswamy. Placement of data integrity security services in open systems interconnection architecture
517 -- 533Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham. SODA: A secure object-oriented database system
537 -- 546Esther H. Highland. Abstracts of recent articles and literature

Volume 8, Issue 5

366 -- 367Harold Joseph Highland. From the editor
369 -- 380Harold Joseph Highland. Random bits & bytes
381 -- 388Harry B. DeMaio. Viruses-a management issue
389 -- 394Belden Menkus. It s time to rethink data processing fire protection
395 -- 396G. J. Bologna. Twenty-two reasons why MIS subordinates don t measure up to their bosses expectations
399 -- 416Holger Bürk, Andreas Pfitzmann. Digital payment systems enabling security and unobservability
417 -- 425W. H. Boshoff, Sebastiaan H. von Solms. A path context model for addressing security in potentially non-secure environments
427 -- 432Simon Wiseman. Preventing viruses in computer systems
433 -- 442Karin P. Badenhorst, Jan H. P. Eloff. Framework of a methodology for the life cycle of computer security in an organization
445 -- 455Esther H. Highland. Abstracts of recent articles and literature

Volume 8, Issue 4

272 -- 273Harold Joseph Highland. From the editor
274 -- 282Harold Joseph Highland. Random bits & bytes
283 -- 290Rodger Jamieson, Graham Low. Security and control issues in local area network design
291 -- 296Kor IJ. Mollema, Ad P. M. Smulders. Prerequisites for data control
297 -- 298Fred Cohen. Computational aspects of computer viruses
303 -- 0Clinton E. White Jr.. Viruses and worms: A campus under attack
305 -- 316Phillip E. Gardner. The internet worm: What was said and when
317 -- 323Bernard P. Zajac Jr.. Disaster recovery - are you really ready?
325 -- 344Lance J. Hoffman. Smoking out the bad actors: Risk analysis in the age of the microcomputer
353 -- 361Esther H. Highland. Abstracts of recent articles and literature

Volume 8, Issue 3

176 -- 177Harold Joseph Highland. From the editor
178 -- 188Harold Joseph Highland. Random bits & bytes
189 -- 199Charles Cresson Wood. Planning: A means to achieve data communications security
201 -- 205Belden Menkus. Physical security: Selecting an access control system
209 -- 221M. Shain. Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services global network
223 -- 227Thomas P. Keenan. Emerging vulnerabilities in office automation security
229 -- 245D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham. Prototyping to explore MLS/DBMS design
259 -- 269Esther H. Highland. Abstracts of recent articles and literature

Volume 8, Issue 2

86 -- 0Harold Joseph Highland. From the editor
91 -- 100Harold Joseph Highland. Random bits & bytes
101 -- 0Harold Joseph Highland. Reports from the victims
107 -- 110Kenneth R. van Wyk. The Lehigh virus
111 -- 113Yisrael Radai. The Israeli PC virus
115 -- 119Belden Menkus. The computer virus situation is not encouraging
123 -- 137Ron Weber. Controls in electronic funds transfer systems: A survey and synthesis
139 -- 147Jan P. Kruys. Security of open systems
149 -- 160Fred Cohen. Models of practical defenses against computer viruses
163 -- 172Esther H. Highland. Abstracts of recent articles and literature

Volume 8, Issue 1

2 -- 0Harold Joseph Highland. From the editor
3 -- 13Harold Joseph Highland. Random bits & bytes
15 -- 21Rolf Moulton, Robert P. Bigelow. Protecting ownership of proprietary information
23 -- 24Lance J. Hoffman. Risk analysis and computer security: Towards a theory at last
25 -- 27Bernard P. Zajac Jr.. Legal options to computer viruses
29 -- 31Jack Bologna. The one minute fraud auditor
35 -- 41Winfried Gleissner. A mathematical theory for the spread of computer viruses
43 -- 54Teresa F. Lunt. Access control policies: Some unanswered questions
55 -- 58Chris J. Mitchell, Dave Rush, Michael Walker. A remark on hash functions for message authentication
59 -- 66J. Feuerlicht, P. Grattan. The role of classification of information in controlling data proliferation in end-user personal computer environment
74 -- 82Esther H. Highland. Abstracts of recent articles and literature