default search action
Computers & Security, Volume 9
Volume 9, Number 1, February 1990
- Harold Joseph Highland:
Random bits & bytes. 4-11 - Charles Cresson Wood:
Principles of secure information systems design. 13-24 - Bernard P. Zajac Jr.:
Computer viruses: Can they be prevented? 25-31 - Charlotte Klopp:
Software vendors capitalize on security needs. 33-35 - Paul Evans, Tina Monk:
Conference report: COMPSEC '89. 41-44 - John M. Carroll:
Conference report: 2300 brave virus threat to attend national security conference. 45-49 - Peter Smulders:
The threat of information theft by reception of electromagnetic radiation from RS-232 cables. 53-58 - Lindsay C. J. Mercer:
Tailor-made auditing of information systems for the detection of fraud. 59-66 - John Burns, Chris J. Mitchell:
A security scheme for resource sharing over a network. 67-75 - Raju Ramaswamy:
A key management algorithm for secure communication in open systems interconnection architecture. 77-84
Volume 9, Number 2, April 1990
- Harold Joseph Highland:
Random bits & bytes. 102-109 - Belden Menkus:
How an "audit trail" aids in maintaining information integrity...as illustrated in retailing. 111-116 - Kirk W. Tabbey:
Computer crime: "Preparing the computer specific search warrant". 117-123 - I. S. Herschberg, Ronald Paans:
Friday the 13th, facts and fancies. 125-130 - Ghannam M. Al-Dossary:
Computer virus prevention and containment on mainframes. 131-137 - Charlotte Klopp:
Microcomputer security systems attempt to lock up desktops. 139-141 - Josep Domingo-Ferrer, Llorenç Huguet i Rotger:
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures. 145-152 - Moshe Zviran, James C. Hoge, Val A. Micucci:
SPAN - a DSS for security plan analysis. 153-160 - Ronald Paans, I. S. Herschberg:
Auditing the change management process. 161-174
Volume 9, Number 3, May 1990
- Harold Joseph Highland:
Random bits & bytes. 196-208 - Belden Menkus:
Understanding data communication security vulnerabilities. 209-213 - Sanford Sherizen:
Criminological concepts and research findings relevant for improving computer crime control. 215-222 - I. S. Herschberg, Ronald Paans:
Sloppy, sloppier, sloppiest. 223-228 - Charlotte Klopp:
More options for physical access control. 229-232 - Claude Laferriere:
A discussion of implementation strategies for secure database management systems. 235-244 - Sead Muftic:
Transaction protection by "antennas". 245-255 - Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Cryptanalysis of a fast cryptographic checksum algorithm. 257-262
Volume 9, Number 4, June 1990
- Harold Joseph Highland:
Random bits & bytes. 282-294 - Steven Homer:
Setting standards in Europe. 295-300 - Bernard P. Zajac Jr.:
People: The "other" side of computer security. 301-303 - Charlotte Klopp:
Vulnerability awareness improves contingency planning. 309-311 - Paul Evans:
How can professional standards be set and maintained? 313-316 - Robert Cole:
A model for security in distributed systems. 319-330 - Lindsay C. J. Mercer:
Fraud detection via regression analysis. 331-338 - Karin P. Badenhorst, Jan H. P. Eloff:
Computer security methodology: Risk analysis and project definition. 339-346
Volume 9, Number 5, August 1990
- Harold Joseph Highland:
Random bits & bytes. 366-378 - Peter Winters:
Secure systems design - an evolving national strategy. 379-389 - Hans Gliss:
East Germany - haven for software piracy. 391-393 - Charles Cresson Wood:
How many information security staff people should you have? 395-402 - Jon David:
The numbers game. 403-407 - Scott K. Jones, Clinton E. White Jr.:
The IPM model of computer virus management. 411-417 - Ivor Lloyd:
Software evaluation in high integrity systems. 419-429 - Robert A. McKosky, Sajjan G. Shiva:
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems. 431-446 - Roger R. Schell, David Bailey:
Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989. 459-460
Volume 9, Number 6, October 1990
- Harold Joseph Highland:
Random bits & bytes. 470-482 - Belden Menkus:
Why data communications are insecure. 483-487 - John M. Carroll:
Security and credibility in an information-intensive society. 489-498 - Tanya Candia:
How VMS keeps out intruders. 499-502 - Bernard P. Zajac Jr.:
The 1990s - what will they hold? 503-507 - Keith Jackson:
Confessions of a security consultant. 509-511 - T. A. Parker:
Application access control standards for distributed systems. 519-528 - Simon R. Wiseman:
Control of confidentiality in databases. 529-537 - Lein Harn, Hung-Yu Lin:
A cryptographic key generation scheme for multilevel data security. 539-546 - Charles Creson Wood:
Spectacular computer crimes - what they are and how they cost American business half a billion dollars a year! : Buck Bloombecker, Don Jones-Irwin, Homewood, IL, 1990. 557
Volume 9, Number 7, November 1990
- Harold Joseph Highland:
Random bits & bytes. 570-586 - Belden Menkus:
The complexity of "long haul" data communication security. 587-592 - Jon David:
The Novell virus. 593-599 - Bernard P. Zajac Jr.:
Interview with Clifford Stoll. 601-603 - Simon Banks:
Security policy. 605-610 - John M. Carroll:
"Do-it-yourself" cryptography. 613-619 - Claude Laferriere, G. Owen Higginson, Gordon G. Bell:
Security architectures for textual databases. 621-630 - Simon J. Shepherd, Peter W. Sanders, A. Patel:
A comprehensive security system - the concepts, agents and protocols. 631-643
Volume 9, Number 8, December 1990
- Harold Joseph Highland:
Random bits & bytes. 660-675 - Charles Cresson Wood:
Fifteen major forces driving the civilian information security market. 677-686 - Jack Bologna:
Ethical issues of the information era. 689-692 - David L. Lathrop:
Perestroika and its implications for computer security in the U.S.S.R. 693-696 - Ingrid M. Olson, Marshall D. Abrams:
Computer access control policy choices. 699-714 - Holger Bürk, Andreas Pfitzmann:
Value exchange systems enabling security and unobservability. 715-721 - Moshe Zviran, William J. Haga:
Cognitive passwords: The key to easy access control. 723-736
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.