


default search action
Computers & Security, Volume 13
Volume 13, Number 1, February 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(1): 4-14 (1994) - Michael Shain:

Security issues with enterprise multimedia. 15-22 - Norman Hoppé:

Achieving consistent security controls throughout a multinational organization. 23-29 - Alenka Hudoklin, Branislav Smitek:

Computer systems security in Slovenia. 30-33 - Jau-Liang Chen, Tzonelih Hwang:

Identity-based conference key broadcast schemes with user authentication. 53-57 - Selwyn Russell:

Audit-by-receiver paradigms for verification of authorization at source of electronic documents. 59-67 - Ed Dawson

, Diane M. Donovan
:
The breadth of Shamir's secret-sharing scheme. 69-78 - Bao-Min Shao, Jing-Jang Hwang, PeCheng Wang:

Distributed assignment of cryptographic keys for access control in a hierarchy. 79-84
Volume 13, Number 2, April 1994
- Harold Joseph Highland:

Random bits & bytes. 98-106 - Jerome Svigals:

Smartcards - A security assessment. 107-114 - Belden Menkus:

The new importance of "business continuity" in data processing disaster recovery planning. 115-118 - Edwin B. Heinlein:

Communications, security, privacy and the law. 119-121 - Chin-Chin Chang, Wen-Yuan Liao:

A remote password authentication scheme based upon ElGamal's signature scheme. 137-144 - Yishay Spector, Jacob Ginzberg:

Pass-sentence - a new approach to computer code. 145-160 - José Vázquez-Gómez:

Multidomain security. 161-184
Volume 13, Number 3, May 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(3): 192-205 (1994) - Robert H. Courtney, Willis H. Ware:

What do we mean by integrity? 206-208 - Charles Cresson Wood:

Fifty ways to secure dial-up connections. 209-215 - Shivraj Kanungo:

Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework. 231-253 - Chin-Chen Chang, Jinn-Ke Jan, Daniel J. Buehrer:

A scheme to determine the relationship between two users in a hierarchy. 255-261 - Scott Magruder:

High-level language computer viruses - a new threat? 263-269
Volume 13, Number 4, 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(4): 278-286 (1994) - Karl Rihaczek:

Data interchange and legal security - signature surrogates. 287-293 - William List, Rob Melville:

Integrity in information systems - Executive summary. 295-301 - Edo Roos Lindgreen, I. S. Herschberg:

On the validity of the Bell-La Padula model. 317-333 - Dennis Longley, S. Vasudevan:

Effect of key generators on the automatic search for flaws in key management schemes. 335-347 - D. N. J. Mostert, Sebastiaan H. von Solms:

A methodology to include computer security, safety and resilience requirements as part of the user requirement. 349-364
Volume 13, Number 5, 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(5): 372-378 (1994) - Leon Strous:

Security evaluation criteria. 379-384 - Michael J. Ganley:

Digital signatures and their uses. 385-391 - Bernard P. Zajac Jr.:

Cost effectiveness of anti-viral scanners. 392-400 - Helen Collinson:

Abstracts of recent articles and literature. Comput. Secur. 13(5): 401-406 (1994) - Karin P. Badenhorst, Jan H. P. Eloff:

TOPM: a formal approach to the optimization of information technology risk management. 411-435 - Eike Born, Helmut G. Stiegler:

Discretionary access control by means of usage conditions. 437-450
Volume 13, Number 6, 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(6): 458-465 (1994) - Thomas Lillywhite:

IT security standards and the adoption of a benchmarking approach. 467-471 - Ian M. Symonds:

Security in distributed and client/server systems - A management view. 473-480 - Edwin B. Heinlein:

17th National Computer Security Conference - An opinion. 481-483 - Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis:

Intrusion detection: Approach and performance issues of the SECURENET system. 495-508 - Bhavani Thuraisingham:

Security issues for federated database systems. 509-525 - Peter B. Ladkin, Harold W. Thimbleby:

Comments on a paper by Voas, Payne and Cohen: 'A model for detecting the existence of software corruption in real time'. 527-531
Volume 13, Number 7, 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(7): 540-546 (1994) - Duncan Harris, David Sidwell:

Distributed database security. 547-557 - Peter Sommer:

Industrial espionage: Analysing the risk. 558-563 - Thomas Hardjono, Yuliang Zheng

, Jennifer Seberry:
Database authentication revisited. 573-580 - Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang:

Authentication and protection of public keys. 581-585 - Jeffrey Picciotto, Richard D. Graubart:

Extended labeling policies for enhanced application support. 587-599 - Horng-Twu Liaw:

A dynamic cryptographic key generation and information broadcasting scheme in information systems. 601-610 - Mark Looi, William J. Caelli:

A note on supplying a trusted clock via a secure device. 611-613
Volume 13, Number 8, 1994
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 13(8): 622-627 (1994) - Jon Ølnes:

Development of security policies. 628-636 - Ken Lindup:

The cyberpunk age. Comput. Secur. 13(8): 637-645 (1994) - Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe:

Security evaluation in information technology standards. 647-650 - Imtiaz Mohammed, David M. Dilts:

Design for dynamic user-role-based security. 661-671 - Sebastiaan H. von Solms, Isak van der Merwe:

The management of computer security profiles using a role-oriented approach. 673-680 - Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu:

Access control with binary keys. 681-686 - Helen Gustafson, Ed Dawson

, Lauren Nielsen, William J. Caelli:
A computer package for measuring the strength of encryption algorithms. 687-697

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














