Journal: Computers & Security

Volume 9, Issue 8

660 -- 675Harold Joseph Highland. Random bits & bytes
677 -- 686Charles Cresson Wood. Fifteen major forces driving the civilian information security market
689 -- 692Jack Bologna. Ethical issues of the information era
693 -- 696David L. Lathrop. Perestroika and its implications for computer security in the U.S.S.R
699 -- 714Ingrid M. Olson, Marshall D. Abrams. Computer access control policy choices
715 -- 721Holger Bürk, Andreas Pfitzmann. Value exchange systems enabling security and unobservability
723 -- 736Moshe Zviran, William J. Haga. Cognitive passwords: The key to easy access control

Volume 9, Issue 7

570 -- 586Harold Joseph Highland. Random bits & bytes
587 -- 592Belden Menkus. The complexity of long haul data communication security
593 -- 599Jon David. The Novell virus
601 -- 603Bernard P. Zajac Jr.. Interview with Clifford Stoll
605 -- 610Simon Banks. Security policy
613 -- 619John M. Carroll. Do-it-yourself cryptography
621 -- 630Claude Laferriere, G. Owen Higginson, Gordon G. Bell. Security architectures for textual databases
631 -- 643S. J. Shepherd, P. W. Sanders, A. Patel. A comprehensive security system - the concepts, agents and protocols

Volume 9, Issue 6

470 -- 482Harold Joseph Highland. Random bits & bytes
483 -- 487Belden Menkus. Why data communications are insecure
489 -- 498John M. Carroll. Security and credibility in an information-intensive society
503 -- 507Bernard P. Zajac Jr.. The 1990s - what will they hold?
509 -- 511Keith Jackson. Confessions of a security consultant
519 -- 528T. A. Parker. Application access control standards for distributed systems
529 -- 537Simon Wiseman. Control of confidentiality in databases
539 -- 546Lein Harn, Hung-Yu Lin. A cryptographic key generation scheme for multilevel data security

Volume 9, Issue 5

366 -- 378Harold Joseph Highland. Random bits & bytes
379 -- 389Peter Winters. Secure systems design - an evolving national strategy
391 -- 393Hans Gliss. East Germany - haven for software piracy
395 -- 402Charles Cresson Wood. How many information security staff people should you have?
403 -- 407Jon David. The numbers game
411 -- 417Scott K. Jones, Clinton E. White Jr.. The IPM model of computer virus management
431 -- 446Robert A. McKosky, Sajjan G. Shiva. A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems
459 -- 460Roger R. Schell, David Bailey. Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989

Volume 9, Issue 4

282 -- 294Harold Joseph Highland. Random bits & bytes
295 -- 300Steven Homer. Setting standards in Europe
301 -- 303Bernard P. Zajac Jr.. People: The "other" side of computer security
309 -- 311Charlotte Klopp. Vulnerability awareness improves contingency planning
313 -- 316Paul Evans. How can professional standards be set and maintained?
319 -- 330Robert Cole. A model for security in distributed systems
331 -- 338Lindsay C. J. Mercer. Fraud detection via regression analysis
339 -- 346Karin P. Badenhorst, Jan H. P. Eloff. Computer security methodology: Risk analysis and project definition

Volume 9, Issue 3

196 -- 208Harold Joseph Highland. Random bits & bytes
209 -- 213Belden Menkus. Understanding data communication security vulnerabilities
223 -- 228I. S. Herschberg, Ronald Paans. Sloppy, sloppier, sloppiest
229 -- 232Charlotte Klopp. More options for physical access control
235 -- 244Claude Laferriere. A discussion of implementation strategies for secure database management systems
245 -- 255Sead Muftic. Transaction protection by antennas
257 -- 262Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle. Cryptanalysis of a fast cryptographic checksum algorithm

Volume 9, Issue 2

102 -- 109Harold Joseph Highland. Random bits & bytes
111 -- 116Belden Menkus. How an audit trail aids in maintaining information integrity...as illustrated in retailing
125 -- 130I. S. Herschberg, Ronald Paans. Friday the 13th, facts and fancies
131 -- 137Ghannam M. Al-Dossary. Computer virus prevention and containment on mainframes
139 -- 141Charlotte Klopp. Microcomputer security systems attempt to lock up desktops
145 -- 152Josep Domingo-Ferrer, Llorenç Huguet i Rotger. Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures
153 -- 160Moshe Zviran, James C. Hoge, Val A. Micucci. SPAN - a DSS for security plan analysis
161 -- 174Ronald Paans, I. S. Herschberg. Auditing the change management process

Volume 9, Issue 1

4 -- 11Harold Joseph Highland. Random bits & bytes
13 -- 24Charles Cresson Wood. Principles of secure information systems design
25 -- 31Bernard P. Zajac Jr.. Computer viruses: Can they be prevented?
33 -- 35Charlotte Klopp. Software vendors capitalize on security needs
41 -- 44Paul Evans, Tina Monk. Conference report: COMPSEC 89
45 -- 49John M. Carroll. Conference report: 2300 brave virus threat to attend national security conference
53 -- 58Peter Smulders. The threat of information theft by reception of electromagnetic radiation from RS-232 cables
59 -- 66Lindsay C. J. Mercer. Tailor-made auditing of information systems for the detection of fraud
67 -- 75John Burns 0003, Chris J. Mitchell. A security scheme for resource sharing over a network
77 -- 84Raju Ramaswamy. A key management algorithm for secure communication in open systems interconnection architecture