


default search action
Computers & Security, Volume 4
Volume 4, Number 1, March 1985
- Harold Joseph Highland:

Editorial. 1-2 - John M. Carroll, W. R. Mac Iver:

COSSAC: a framework for analyzing and configuring secure computer facilities. 5-12 - James A. Schweitzer:

A management view: computer security as a discretionary decision. 13-22 - Graham Gal, William E. McCarthy:

Specification of internal accounting controls in a database environment. 23-32 - Michael J. Cerullo:

General controls in computer systems. 33-45 - Stephen C. Serpell:

Cryptographic equipment security: a code of practice. 47-64 - Harold Joseph Highland:

The first national computer security conference. 65-73
Volume 4, Number 2, June 1985
- Harold Joseph Highland:

Editorial. 101-102 - Isaac L. Auerbach:

Professional responsibility for information privacy. 103-107 - Gee Kin Yeo:

Incorporating access control in forms systems. 109-122 - Harold Joseph Highland:

Microcomputer security: Data protection techniques. 123-134 - Belden Menkus:

The EDP auditor's role in computer security. 135-138 - James E. Miller:

Transaction controls: Steps to take after the equipment has been secured. 139-141 - Jan H. P. Eloff:

The development of a specification language for a computer security system. 143-147 - Per L. Hoving, Johan Essén:

Minutes from the first meeting of TC 11, security and protection in information processing systems. 149-152
Volume 4, Number 3, September 1985
- Harold Joseph Highland:

Editorial : Office automation or on the value of being a dinosaur. 185-186 - Fred Cohen:

A secure computer network design. 189-205 - Jean-Pierre Chamoux:

Data security and confidentiality in Europe. 207-210 - Józef P. Pieprzyk

, Dominik Rutkowski:
Modular design of information encipherment for computer systems. 211-218 - Belden Menkus:

The impact of the Bell system breakup on DP disaster recovery planning. 219-222 - Charles Cresson Wood:

Floppy diskette security measures. 223-228 - Harold Joseph Highland:

U.S. computer crime legislation highlighted in special report. 245-246
- Harold Joseph Highland:

Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95. 247 - Harold Joseph Highland:

Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95. 247-248 - Charles Cresson Wood:

Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50. 248-249 - Harold Joseph Highland:

Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25. 249 - Esther Harris Highland:

Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ US $28.75. 249 - Esther Harris Highland:

Proceedings of the seventh computer security group conference : Washington: US government printing office, 1984 - 776-101/1027. 115 pages. 249-250
Volume 4, Number 4, December 1985
- Harold Joseph Highland:

Editorial. 267-268 - Wim van Eck:

Electromagnetic radiation from video display units: An eavesdropping risk? 269-286 - Ken Wong:

Computer crime - Risk management and computer security. 287-295 - Józef P. Pieprzyk

, Dominik Rutkowski:
Design of public key cryptosystems using idempotent elements. 297-308 - Pieter de Bruyne:

Signature verification using holistic measures. 309-315 - A. J. du Croix:

Data sharing and access protection in business system 12. 317-323 - Victor L. Voydock, Stephen T. Kent:

Security mechanisms in a transport layer protocol. 325-341

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














