


default search action
Computers & Security, Volume 7
Volume 7, Number 1, February 1988
- Harold Joseph Highland:

Case history of a virus attack. 3-5 - Harold Joseph Highland:

Encryption, attacks and ethics. 5-6 - Harold Joseph Highland:

How to protect a microcomputer system. 6-7 - Harold Joseph Highland:

Chernobyl computer communications. 7-9 - Harold Joseph Highland:

Electromagnetic interference. 9-10 - Harold Joseph Highland:

IFIP/Sec '88. 10 - Harold Joseph Highland:

For your information. 10-11 - Harold Joseph Highland:

Product reviews. 13-18 - Robert H. Courtney Jr.:

Another perspective on sensitive but unclassified data. 19-23 - Harold Joseph Highland:

How secure are fiber optics communications? 25-26 - Harold Joseph Highland:

Secretdisk II - transparent automatic encryption. 27-34 - Bernard P. Zajac Jr.:

Dial-up communication lines: Can they be secured? 35-36 - Harold Joseph Highland:

Program aids for office automation security. 37-43 - Belden Menkus:

Getting started in data processing disaster recovery. 47-52 - Ellen Amsel:

Network security and access controls. 53-57 - Niv Ahituv, Yeheskel Lapid, Seev Neumann:

Protecting statistical databases against retrieval of private information. 59-63 - Per Christoffersson:

Message authentication and encryption combined. 65-71 - Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell

, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. 73-82 - Arto Salomaa:

A public-key cryptosystem based on language theory. 83-87 - Abstracts of recent articles and literature. Comput. Secur. 7(1): 101-110 (1988)

Volume 7, Number 2, April 1988
- Harold Joseph Highland:

From the editor. 114 - William A. J. Bound:

Discussing security with top management. 129-130 - Bernard P. Zajac Jr.:

Personnel: The other half of data security. 131-132 - Belden Menkus:

Understanding the use of passwords. 132-136 - G. J. Bologna:

Pitfalls in measuring MIS performance. 137-138 - William Hugh Murray:

The application of epidemiology to computer viruses. 139-145 - Harold Joseph Highland:

Anatomy of a virus attack. 145-150 - Viiveke Fåk:

Are we vulnerable to a virus attack? A report from Sweden. 151-155 - Harold Joseph Highland:

An overview of 18 virus protection products. 157-161 - Harold Joseph Highland:

How to combat a computer virus. 157 - Fred Cohen:

On the implications of computer viruses and methods of defense. 167-184 - Detmar W. Straub Jr.:

Organizational structuring of the computer security function. 185-195 - I. S. Herschberg:

Make the tigers hunt for you. 197-203 - Abstracts of recent articles and literature. Comput. Secur. 7(2): 213-223 (1988)

Volume 7, Number 3, June 1988
- Harold Joseph Highland:

From the editor. 228 - Harold Joseph Highland:

Open Sesame-Hackers welcome. 232-233 - Harold Joseph Highland:

Security director's dilemma. 233-235 - Harold Joseph Highland:

How to test a virus filter without a virus. 235-237 - Harold Joseph Highland:

Virus disaster red book. 237 - Harold Joseph Highland:

Blitzed by a computer virus. 237-239 - Harold Joseph Highland:

Special virus protection measures. 239-242 - Harold Joseph Highland:

Upcoming conferences of note. 242-243 - Harold Joseph Highland:

Star wars security or where did those micros go? 243-244 - Jack Bologna:

Managing an information system crisis. 245-247 - Bernard P. Zajac Jr.:

Distributed data processing: New problems. 249-250 - G. Will Milor:

The computer security act of 1987. 251-253 - Jon David:

Treating viral fever. 255-258 - Belden Menkus:

Breakpoints. 261-268 - Margaret E. van Biene-Hershey:

The technical EDP-audit function. 271-277 - Fred Cohen:

Designing provably correct information networks with digital diodes. 279-286 - G. M. J. Pluimakers:

Some notes on authorization and transaction management in distributed database systems. 287-298 - Dirk Van der Bank, Edwin Anderssen:

Cryptographic figures of merit. 299-303 - Harold Joseph Highland:

Report on the fourth national computer security conference: COMPSEC IV. 309-311 - Ronald Paans:

The second European conference on computer audit, control and security. 312-315 - Abstracts of recent articles and literature. Comput. Secur. 7(3): 320-331 (1988)

Volume 7, Number 4, August 1988
- Harold Joseph Highland:

From the editor. 334
- Frederick Cohen:

Ethical issues in computer virus distribution. 335-336
- Harold Joseph Highland:

How to obtain a computer virus. 337 - Harold Joseph Highland:

Are virus attack statistics reliable? 338 - Harold Joseph Highland:

Hackers revisited. 339 - Harold Joseph Highland:

New video terminal law. 340 - Harold Joseph Highland:

Electromagnetic eavesdropping machines for christmas? 341 - Harold Joseph Highland:

Tips on terrorism. 344 - Harold Joseph Highland:

Investigating a reported virus attack. 344-345 - Harold Joseph Highland:

Virus filter update. 345 - C. Wayne Madsen:

The world meganetwork and terrorism. 347-352 - Jack Bologna:

Selection risks in hiring information systems personnel. 353-355 - Harold Joseph Highland:

The anatomy of a DOS Disk. 357-360 - Belden Menkus:

U.S. Government agencies belatedly address information system security issues. 361-366 - Harold Joseph Highland:

The brain virus: Fact and fantasy. 367-370 - Rita C. Summers, Stanley A. Kurzban:

Potential applications of knowledge-based methods to computer security. 373-385 - John McHugh, Bhavani M. Thuraisingham:

Multilevel security issues in distributed database management systems. 387-396 - Ian H. Witten, John G. Cleary:

On the privacy afforded by adaptive text compression. 397-408 - Fred Cohen, Stephen Bruhns:

Two secure file servers. 409-414 - Abstracts of recent articles and literature. Comput. Secur. 7(4): 423-434 (1988)

Volume 7, Number 5, October 1988
- Harold Joseph Highland:

From the editor. 438 - Harold Joseph Highland:

U.S. Congress computer virus report. 439 - Harold Joseph Highland:

Write-protect tab warning. 439 - Harold Joseph Highland:

Virus filter evaluation. 440 - Harold Joseph Highland:

Virus filter update. 441-442 - Harold Joseph Highland:

Computer viruses: Media hyperbole, errors and ignorance. 442-450 - Raymond M. Glath:

The case of the "Gerbil virus" that wasn't. 451-453 - Charles Cresson Wood:

A context for information systems security planning. 455-465 - James A. Schweitzer:

Security news briefs. 467-469 - Bernard P. Zajac Jr.:

Viruses: Should we quit talking about them? 471-472 - John M. Carroll, Robert B. Mowat, Lynda E. Robbins, David Wiseman:

The password predictor - a training aid for raising security awareness. 475-481 - Chris J. Mitchell

, Michael Walker:
Solutions to the multidestination secure electronic mail problem. 483-488 - Fred Cohen:

Maintaining a poor person's information integrity. 489-494 - Charles P. Pfleeger, Shari Lawrence Pfleeger:

A transaction flow approach to software security certification for document handling systems. 495-502 - Yue Jiang Huang, Fred Cohen:

Some weak points of one fast cryptographic checksum algorithm and its improvement. 503-505 - Abstracts of recent articles and literature. Comput. Secur. 7(5): 509-520 (1988)

- Abstracts of recent articles and literature. Comput. Secur. 7(5): 521-529 (1988)

Volume 7, Number 6, December 1988
- Harold Joseph Highland:

From the editor. 532 - Harold Joseph Highland:

Random bits & bytes. 533-541 - Cliff Stoll:

How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers. 543-547 - Belden Menkus:

Understanding password compromise. 549-552 - Jack Bologna:

Soviet white-collar crime and criminal justice. 553-556 - Jan H. P. Eloff:

Computer security policy: Important issues. 559-562 - John M. Carroll:

Implementing multilevel security by violation privilege. 563-573 - Joachim Biskup, Hans Hermann Brüggemann:

The personal model of data: Towards a privacy-oriented information system. 575-597 - Ravinderpal Singh Sandhu:

Nested categories for access control. 599-605 - Abstracts of recent articles and literature. 609-615


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














