


default search action
Computers & Security, Volume 5
Volume 5, Number 1, March 1986
- Harold Joseph Highland:

In this issue... 1 - Bernard P. Zajac Jr.:

What to do when you have reason to believe your computer has been compromised. 11-16 - A. Kinnon, Robert H. Davis:

Audit and security implications of electronic funds transfer. 17-23 - Ted Goeltz:

Why not DES? 24-27 - Robert M. Harper Jr.:

Internal control in local area networks: An accountant's perspective. 28-35 - R. van den Assem, W. J. van Elk:

A chosen-plaintext attack on the microsoft BASIC protection. 36-45 - Ronald Paans, I. S. Herschberg:

How to control MVS user supervisor calls. 46-54 - Kenneth Owen:

Computer security: IFIP addresses the practical issues. 68-72 - Per L. Hoving:

System security: The technical challenge. 74-79
Volume 5, Number 2, June 1986
- Harold Joseph Highland:

In this issue... 83 - Johan Essén:

New member of the International Board of Editors. 84 - Harold Joseph Highland:

Electromagnetic radiation revisited. 85-93 - Willis H. Ware:

Emerging privacy issues. 101-113 - Charles Cresson Wood, Howard M. Zeidler:

Security modules: Potent information security system components. 114-121 - L. Hoebeke:

Computer security - Prevention: Lessons from the operation of a nuclear power plant. 122-127 - Rick F. van der Lans:

Data security in a relational database environment. 128-134 - Roy Martin Richards Jr., Jan Yestingsmeier:

Risk management - a key to security in the electronic funds transfer system. 135-140 - Matt Bishop

:
A pauper's callback scheme. 141-144 - Cees J. A. Jansen:

On the key storage requirements for secure terminals. 145-149 - Willis H. Ware:

Emerging privacy issues. 167 - John M. Carroll, Helmut Jürgensen:

Design of a secure relational data base. 167 - Viiveke Fåk:

Software versus hardware encryption - Is there any difference today? 167 - Frederick G. Tompkins, Russel S. Rice:

Intergrating security activities into the software development life cycle and the software quality assurance process. 167 - June M. Power, Steve R. Wilbur:

Authentication in a heterogeneous environment. 167 - T. K. Worthington, J. J. Chainer, J. D. Willford, S. C. Gunderson:

IBM dynamic signature verification. 167-168 - Hans-Jürgen Kugler:

Concepts of protection in the IFIP WG 2.7 reference model for command and response languages. 168 - Ivan Ekebrink:

Security of electronic transactions. 168 - John G. Beatson:

Development and organization of the audit and security functions. 168 - William T. Tener:

Decision support systems - A necessity for effective auditing of controls. 168 - Roger T. Doswell:

The audit, control and security of the project life cycle - Pre-implementation stage. 168 - Peter P. C. H. Kingston, Martin Goulbourn:

Security for small business computers. 168 - Philip M. Stanley:

Educating computer crime investigators. 168-169 - Gerald E. Murine:

Producing reliable, secure software. 169 - Charles Cresson Wood:

Establishing technical systems security standards at a large multinational bank. 169 - Donald W. Davies:

How to use the DES safely. 169
Volume 5, Number 3, September 1986
- Harold Joseph Highland:

In this issue ... 179-180 - Harold Joseph Highland, Viiveke Fåk:

Electromagnetic radiation revisited, part II. 181-184 - Charles Cresson Wood:

Establishing internal technical systems security standards. 193-200 - John G. Beatson:

Managing the EDP audit and security functions. 201-206 - Roy Martin Richards Jr.:

Insuring computer risks. 207-210 - Lance J. Hoffman, Lucy M. Moran:

Societal vulnerability to computer system failures. 211-217 - Frederick G. Tompkins, Russell S. Rice:

Integrating security activities into the software development life cycle and the software quality assurance process. 218-242 - G. M. J. Pluimakers, J. van Leeuwen

:
Authentication: A concise survey. 243-250 - Yeheskel Lapid, Niv Ahituv, Seev Neumann:

Approaches to handling "Trojan Horse" threats. 251-256
Volume 5, Number 4, December 1986
- Harold Joseph Highland:

In this issue ... 277-278 - William T. Tener:

Detection of control deterioration using decision support systems. 290-295 - Linda S. Rutledge, Lance J. Hoffman:

A survey of issues in computer network security. 296-308 - Philip M. Stanley:

Computer crime investigation and investigators. 309-313 - Paul A. Karger:

Authentication and discretionary access control in computer networks. 314-324 - Ivan Ekebrink:

Data security in terminalized system. 325-327 - Vangalur S. Alagar:

A human approach to the technological challenges in data security. 328-335 - Gerald E. Murine:

Secure software's impact on reliability. 336-339 - Harold Joseph Highland:

How to modify a microcomputer operating system for added security. 340-343 - Hilmi Erdem:

Host cryptographic operations: A software implementation. 344-346 - Patrick Leahy:

Privacy and progress. 347-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














