researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
8
, Issue
8
644
--
646
Harold Joseph Highland
.
From the editor
647
--
657
Harold Joseph Highland
.
Random bits & bytes
659
--
661
Harold Joseph Highland
.
Datacrime virus and new anti-virus products
663
--
668
Charles Preston
.
Review of VIRUSCAN
669
--
674
Harold Joseph Highland
.
VCHECKER - a virus search program
675
--
689
David L. Jobusch
,
Arthur E. Oldehoeft
.
A survey of password mechanisms: Weaknesses and potential improvements. Part 2
693
--
708
Vijay Varadharajan
.
Verification of network security protocols
709
--
720
Raju Ramaswamy
.
Security architecture for data transfer through TCP/IP protocols
721
--
730
Bhavani M. Thuraisingham
.
A functional view of multilevel databases
Volume
8
, Issue
7
553
--
561
Harold Joseph Highland
.
Random bits & bytes
563
--
568
Harold Joseph Highland
.
Secret disk II - administrator
581
--
586
Belden Menkus
.
Computer-related fire problems revisited
587
--
604
David L. Jobusch
,
Arthur E. Oldehoeft
.
A survey of password mechanisms: Weaknesses and potential improvements. Part 1
607
--
611
Khosrow Dehnad
.
A simple way of improving the login security
613
--
620
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
,
Mary Frances Theofanos
.
A methodology for penetration testing
621
--
630
Dieter Bong
,
Christoph Ruland
.
Optimized software implementations of the modular exponentiation on general purpose microprocessors
Volume
8
, Issue
6
458
--
459
Harold Joseph Highland
.
From the editor
460
--
478
Harold Joseph Highland
.
Random bits & bytes
479
--
485
Phillip E. Gardner
.
Evaluation of five risk assessment programs
487
--
492
Belden Menkus
.
The employee s role in protecting information assets
495
--
505
C. L. Harrold
.
An introduction to the SMITE approach to secure computing
507
--
516
Raju Ramaswamy
.
Placement of data integrity security services in open systems interconnection architecture
517
--
533
Thomas F. Keefe
,
Wei-Tek Tsai
,
Bhavani M. Thuraisingham
.
SODA: A secure object-oriented database system
537
--
546
Esther H. Highland
.
Abstracts of recent articles and literature
Volume
8
, Issue
5
366
--
367
Harold Joseph Highland
.
From the editor
369
--
380
Harold Joseph Highland
.
Random bits & bytes
381
--
388
Harry B. DeMaio
.
Viruses-a management issue
389
--
394
Belden Menkus
.
It s time to rethink data processing fire protection
395
--
396
G. J. Bologna
.
Twenty-two reasons why MIS subordinates don t measure up to their bosses expectations
399
--
416
Holger Bürk
,
Andreas Pfitzmann
.
Digital payment systems enabling security and unobservability
417
--
425
W. H. Boshoff
,
Sebastiaan H. von Solms
.
A path context model for addressing security in potentially non-secure environments
427
--
432
Simon Wiseman
.
Preventing viruses in computer systems
433
--
442
Karin P. Badenhorst
,
Jan H. P. Eloff
.
Framework of a methodology for the life cycle of computer security in an organization
445
--
455
Esther H. Highland
.
Abstracts of recent articles and literature
Volume
8
, Issue
4
272
--
273
Harold Joseph Highland
.
From the editor
274
--
282
Harold Joseph Highland
.
Random bits & bytes
283
--
290
Rodger Jamieson
,
Graham Low
.
Security and control issues in local area network design
291
--
296
Kor IJ. Mollema
,
Ad P. M. Smulders
.
Prerequisites for data control
297
--
298
Fred Cohen
.
Computational aspects of computer viruses
303
--
0
Clinton E. White Jr.
.
Viruses and worms: A campus under attack
305
--
316
Phillip E. Gardner
.
The internet worm: What was said and when
317
--
323
Bernard P. Zajac Jr.
.
Disaster recovery - are you really ready?
325
--
344
Lance J. Hoffman
.
Smoking out the bad actors: Risk analysis in the age of the microcomputer
353
--
361
Esther H. Highland
.
Abstracts of recent articles and literature
Volume
8
, Issue
3
176
--
177
Harold Joseph Highland
.
From the editor
178
--
188
Harold Joseph Highland
.
Random bits & bytes
189
--
199
Charles Cresson Wood
.
Planning: A means to achieve data communications security
201
--
205
Belden Menkus
.
Physical security: Selecting an access control system
209
--
221
M. Shain
.
Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services global network
223
--
227
Thomas P. Keenan
.
Emerging vulnerabilities in office automation security
229
--
245
D. J. Thomsen
,
Wei-Tek Tsai
,
Bhavani M. Thuraisingham
.
Prototyping to explore MLS/DBMS design
259
--
269
Esther H. Highland
.
Abstracts of recent articles and literature
Volume
8
, Issue
2
86
--
0
Harold Joseph Highland
.
From the editor
91
--
100
Harold Joseph Highland
.
Random bits & bytes
101
--
0
Harold Joseph Highland
.
Reports from the victims
107
--
110
Kenneth R. van Wyk
.
The Lehigh virus
111
--
113
Yisrael Radai
.
The Israeli PC virus
115
--
119
Belden Menkus
.
The computer virus situation is not encouraging
123
--
137
Ron Weber
.
Controls in electronic funds transfer systems: A survey and synthesis
139
--
147
Jan P. Kruys
.
Security of open systems
149
--
160
Fred Cohen
.
Models of practical defenses against computer viruses
163
--
172
Esther H. Highland
.
Abstracts of recent articles and literature
Volume
8
, Issue
1
2
--
0
Harold Joseph Highland
.
From the editor
3
--
13
Harold Joseph Highland
.
Random bits & bytes
15
--
21
Rolf Moulton
,
Robert P. Bigelow
.
Protecting ownership of proprietary information
23
--
24
Lance J. Hoffman
.
Risk analysis and computer security: Towards a theory at last
25
--
27
Bernard P. Zajac Jr.
.
Legal options to computer viruses
29
--
31
Jack Bologna
.
The one minute fraud auditor
35
--
41
Winfried Gleissner
.
A mathematical theory for the spread of computer viruses
43
--
54
Teresa F. Lunt
.
Access control policies: Some unanswered questions
55
--
58
Chris J. Mitchell
,
Dave Rush
,
Michael Walker
.
A remark on hash functions for message authentication
59
--
66
J. Feuerlicht
,
P. Grattan
.
The role of classification of information in controlling data proliferation in end-user personal computer environment
74
--
82
Esther H. Highland
.
Abstracts of recent articles and literature