researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
9
, Issue
8
660
--
675
Harold Joseph Highland
.
Random bits & bytes
677
--
686
Charles Cresson Wood
.
Fifteen major forces driving the civilian information security market
689
--
692
Jack Bologna
.
Ethical issues of the information era
693
--
696
David L. Lathrop
.
Perestroika and its implications for computer security in the U.S.S.R
699
--
714
Ingrid M. Olson
,
Marshall D. Abrams
.
Computer access control policy choices
715
--
721
Holger Bürk
,
Andreas Pfitzmann
.
Value exchange systems enabling security and unobservability
723
--
736
Moshe Zviran
,
William J. Haga
.
Cognitive passwords: The key to easy access control
Volume
9
, Issue
7
570
--
586
Harold Joseph Highland
.
Random bits & bytes
587
--
592
Belden Menkus
.
The complexity of long haul data communication security
593
--
599
Jon David
.
The Novell virus
601
--
603
Bernard P. Zajac Jr.
.
Interview with Clifford Stoll
605
--
610
Simon Banks
.
Security policy
613
--
619
John M. Carroll
.
Do-it-yourself cryptography
621
--
630
Claude Laferriere
,
G. Owen Higginson
,
Gordon G. Bell
.
Security architectures for textual databases
631
--
643
S. J. Shepherd
,
P. W. Sanders
,
A. Patel
.
A comprehensive security system - the concepts, agents and protocols
Volume
9
, Issue
6
470
--
482
Harold Joseph Highland
.
Random bits & bytes
483
--
487
Belden Menkus
.
Why data communications are insecure
489
--
498
John M. Carroll
.
Security and credibility in an information-intensive society
503
--
507
Bernard P. Zajac Jr.
.
The 1990s - what will they hold?
509
--
511
Keith Jackson
.
Confessions of a security consultant
519
--
528
T. A. Parker
.
Application access control standards for distributed systems
529
--
537
Simon Wiseman
.
Control of confidentiality in databases
539
--
546
Lein Harn
,
Hung-Yu Lin
.
A cryptographic key generation scheme for multilevel data security
Volume
9
, Issue
5
366
--
378
Harold Joseph Highland
.
Random bits & bytes
379
--
389
Peter Winters
.
Secure systems design - an evolving national strategy
391
--
393
Hans Gliss
.
East Germany - haven for software piracy
395
--
402
Charles Cresson Wood
.
How many information security staff people should you have?
403
--
407
Jon David
.
The numbers game
411
--
417
Scott K. Jones
,
Clinton E. White Jr.
.
The IPM model of computer virus management
431
--
446
Robert A. McKosky
,
Sajjan G. Shiva
.
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems
459
--
460
Roger R. Schell
,
David Bailey
.
Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989
Volume
9
, Issue
4
282
--
294
Harold Joseph Highland
.
Random bits & bytes
295
--
300
Steven Homer
.
Setting standards in Europe
301
--
303
Bernard P. Zajac Jr.
.
People: The "other" side of computer security
309
--
311
Charlotte Klopp
.
Vulnerability awareness improves contingency planning
313
--
316
Paul Evans
.
How can professional standards be set and maintained?
319
--
330
Robert Cole
.
A model for security in distributed systems
331
--
338
Lindsay C. J. Mercer
.
Fraud detection via regression analysis
339
--
346
Karin P. Badenhorst
,
Jan H. P. Eloff
.
Computer security methodology: Risk analysis and project definition
Volume
9
, Issue
3
196
--
208
Harold Joseph Highland
.
Random bits & bytes
209
--
213
Belden Menkus
.
Understanding data communication security vulnerabilities
223
--
228
I. S. Herschberg
,
Ronald Paans
.
Sloppy, sloppier, sloppiest
229
--
232
Charlotte Klopp
.
More options for physical access control
235
--
244
Claude Laferriere
.
A discussion of implementation strategies for secure database management systems
245
--
255
Sead Muftic
.
Transaction protection by antennas
257
--
262
Bart Preneel
,
Antoon Bosselaers
,
René Govaerts
,
Joos Vandewalle
.
Cryptanalysis of a fast cryptographic checksum algorithm
Volume
9
, Issue
2
102
--
109
Harold Joseph Highland
.
Random bits & bytes
111
--
116
Belden Menkus
.
How an audit trail aids in maintaining information integrity...as illustrated in retailing
125
--
130
I. S. Herschberg
,
Ronald Paans
.
Friday the 13th, facts and fancies
131
--
137
Ghannam M. Al-Dossary
.
Computer virus prevention and containment on mainframes
139
--
141
Charlotte Klopp
.
Microcomputer security systems attempt to lock up desktops
145
--
152
Josep Domingo-Ferrer
,
Llorenç Huguet i Rotger
.
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures
153
--
160
Moshe Zviran
,
James C. Hoge
,
Val A. Micucci
.
SPAN - a DSS for security plan analysis
161
--
174
Ronald Paans
,
I. S. Herschberg
.
Auditing the change management process
Volume
9
, Issue
1
4
--
11
Harold Joseph Highland
.
Random bits & bytes
13
--
24
Charles Cresson Wood
.
Principles of secure information systems design
25
--
31
Bernard P. Zajac Jr.
.
Computer viruses: Can they be prevented?
33
--
35
Charlotte Klopp
.
Software vendors capitalize on security needs
41
--
44
Paul Evans
,
Tina Monk
.
Conference report: COMPSEC 89
45
--
49
John M. Carroll
.
Conference report: 2300 brave virus threat to attend national security conference
53
--
58
Peter Smulders
.
The threat of information theft by reception of electromagnetic radiation from RS-232 cables
59
--
66
Lindsay C. J. Mercer
.
Tailor-made auditing of information systems for the detection of fraud
67
--
75
John Burns 0003
,
Chris J. Mitchell
.
A security scheme for resource sharing over a network
77
--
84
Raju Ramaswamy
.
A key management algorithm for secure communication in open systems interconnection architecture