default search action
Computers & Security, Volume 13
Volume 13, Number 1, February 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(1): 4-14 (1994) - Michael Shain:
Security issues with enterprise multimedia. 15-22 - Norman Hoppé:
Achieving consistent security controls throughout a multinational organization. 23-29 - Alenka Hudoklin, Branislav Smitek:
Computer systems security in Slovenia. 30-33 - Jau-Liang Chen, Tzonelih Hwang:
Identity-based conference key broadcast schemes with user authentication. 53-57 - Selwyn Russell:
Audit-by-receiver paradigms for verification of authorization at source of electronic documents. 59-67 - Ed Dawson, Diane M. Donovan:
The breadth of Shamir's secret-sharing scheme. 69-78 - Bao-Min Shao, Jing-Jang Hwang, PeCheng Wang:
Distributed assignment of cryptographic keys for access control in a hierarchy. 79-84
Volume 13, Number 2, April 1994
- Harold Joseph Highland:
Random bits & bytes. 98-106 - Jerome Svigals:
Smartcards - A security assessment. 107-114 - Belden Menkus:
The new importance of "business continuity" in data processing disaster recovery planning. 115-118 - Edwin B. Heinlein:
Communications, security, privacy and the law. 119-121 - Chin-Chin Chang, Wen-Yuan Liao:
A remote password authentication scheme based upon ElGamal's signature scheme. 137-144 - Yishay Spector, Jacob Ginzberg:
Pass-sentence - a new approach to computer code. 145-160 - José Vázquez-Gómez:
Multidomain security. 161-184
Volume 13, Number 3, May 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(3): 192-205 (1994) - Robert H. Courtney, Willis H. Ware:
What do we mean by integrity? 206-208 - Charles Cresson Wood:
Fifty ways to secure dial-up connections. 209-215 - Shivraj Kanungo:
Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework. 231-253 - Chin-Chen Chang, Jinn-Ke Jan, Daniel J. Buehrer:
A scheme to determine the relationship between two users in a hierarchy. 255-261 - Scott Magruder:
High-level language computer viruses - a new threat? 263-269
Volume 13, Number 4, 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(4): 278-286 (1994) - Karl Rihaczek:
Data interchange and legal security - signature surrogates. 287-293 - William List, Rob Melville:
Integrity in information systems - Executive summary. 295-301 - Edo Roos Lindgreen, I. S. Herschberg:
On the validity of the Bell-La Padula model. 317-333 - Dennis Longley, S. Vasudevan:
Effect of key generators on the automatic search for flaws in key management schemes. 335-347 - D. N. J. Mostert, Sebastiaan H. von Solms:
A methodology to include computer security, safety and resilience requirements as part of the user requirement. 349-364
Volume 13, Number 5, 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(5): 372-378 (1994) - Leon Strous:
Security evaluation criteria. 379-384 - Michael J. Ganley:
Digital signatures and their uses. 385-391 - Bernard P. Zajac Jr.:
Cost effectiveness of anti-viral scanners. 392-400 - Helen Collinson:
Abstracts of recent articles and literature. Comput. Secur. 13(5): 401-406 (1994) - Karin P. Badenhorst, Jan H. P. Eloff:
TOPM: a formal approach to the optimization of information technology risk management. 411-435 - Eike Born, Helmut G. Stiegler:
Discretionary access control by means of usage conditions. 437-450
Volume 13, Number 6, 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(6): 458-465 (1994) - Thomas Lillywhite:
IT security standards and the adoption of a benchmarking approach. 467-471 - Ian M. Symonds:
Security in distributed and client/server systems - A management view. 473-480 - Edwin B. Heinlein:
17th National Computer Security Conference - An opinion. 481-483 - Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis:
Intrusion detection: Approach and performance issues of the SECURENET system. 495-508 - Bhavani Thuraisingham:
Security issues for federated database systems. 509-525 - Peter B. Ladkin, Harold W. Thimbleby:
Comments on a paper by Voas, Payne and Cohen: 'A model for detecting the existence of software corruption in real time'. 527-531
Volume 13, Number 7, 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(7): 540-546 (1994) - Duncan Harris, David Sidwell:
Distributed database security. 547-557 - Peter Sommer:
Industrial espionage: Analysing the risk. 558-563 - Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Database authentication revisited. 573-580 - Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang:
Authentication and protection of public keys. 581-585 - Jeffrey Picciotto, Richard D. Graubart:
Extended labeling policies for enhanced application support. 587-599 - Horng-Twu Liaw:
A dynamic cryptographic key generation and information broadcasting scheme in information systems. 601-610 - Mark Looi, William J. Caelli:
A note on supplying a trusted clock via a secure device. 611-613
Volume 13, Number 8, 1994
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(8): 622-627 (1994) - Jon Ølnes:
Development of security policies. 628-636 - Ken Lindup:
The cyberpunk age. Comput. Secur. 13(8): 637-645 (1994) - Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe:
Security evaluation in information technology standards. 647-650 - Imtiaz Mohammed, David M. Dilts:
Design for dynamic user-role-based security. 661-671 - Sebastiaan H. von Solms, Isak van der Merwe:
The management of computer security profiles using a role-oriented approach. 673-680 - Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu:
Access control with binary keys. 681-686 - Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:
A computer package for measuring the strength of encryption algorithms. 687-697
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.