


default search action
Computers & Security, Volume 8
Volume 8, Number 1, February 1989
- Harold Joseph Highland:

From the editor. 2 - Harold Joseph Highland:

Random bits & bytes. 3-13 - Rolf Moulton, Robert P. Bigelow:

Protecting ownership of proprietary information. 15-21 - Lance J. Hoffman:

Risk analysis and computer security: Towards a theory at last. 23-24 - Bernard P. Zajac Jr.:

Legal options to computer viruses. 25-27 - Jack Bologna:

The one minute fraud auditor. 29-31 - Winfried Gleissner:

A mathematical theory for the spread of computer viruses. 35-41 - Teresa F. Lunt:

Access control policies: Some unanswered questions. 43-54 - Chris J. Mitchell

, Dave Rush, Michael Walker:
A remark on hash functions for message authentication. 55-58 - J. Feuerlicht, P. Grattan:

The role of classification of information in controlling data proliferation in end-user personal computer environment. 59-66 - Esther H. Highland:

Abstracts of recent articles and literature. 74-82
Volume 8, Number 2, April 1989
- Harold Joseph Highland:

From the editor. 86 - Harold Joseph Highland:

Random bits & bytes. 91-100 - Harold Joseph Highland:

Reports from the victims. 101 - Anne E. Webster:

University of Delaware and the Pakistani computer virus. 103-105 - Kenneth R. van Wyk:

The Lehigh virus. 107-110 - Yisrael Radai:

The Israeli PC virus. 111-113 - Belden Menkus:

The computer virus situation is not encouraging. 115-119 - Ron Weber:

Controls in electronic funds transfer systems: A survey and synthesis. 123-137 - Jan P. Kruys:

Security of open systems. 139-147 - Fred Cohen:

Models of practical defenses against computer viruses. 149-160 - Esther H. Highland:

Abstracts of recent articles and literature. 163-172
Volume 8, Number 3, May 1989
- Harold Joseph Highland:

From the editor. 176-177 - Harold Joseph Highland:

Random bits & bytes. 178-188 - Charles Cresson Wood:

Planning: A means to achieve data communications security. 189-199 - Belden Menkus:

Physical security: Selecting an access control system. 201-205 - M. Shain:

Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services' global network. 209-221 - Thomas P. Keenan

:
Emerging vulnerabilities in office automation security. 223-227 - D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:

Prototyping to explore MLS/DBMS design. 229-245 - Ken J. Fifield:

Smartcards outsmart computer crime. 247-255 - Esther H. Highland:

Abstracts of recent articles and literature. 259-269
Volume 8, Number 4, June 1989
- Harold Joseph Highland:

From the editor. 272-273 - Harold Joseph Highland:

Random bits & bytes. 274-282 - Rodger Jamieson, Graham Low:

Security and control issues in local area network design. 283-290 - Kor IJ. Mollema, Ad P. M. Smulders:

Prerequisites for data control. 291-296 - Fred Cohen:

Computational aspects of computer viruses. 297-298 - Clinton E. White Jr.:

Viruses and worms: A campus under attack. 303 - Phillip E. Gardner:

The internet worm: What was said and when. 305-316 - Bernard P. Zajac Jr.:

Disaster recovery - are you really ready? 317-323 - Lance J. Hoffman:

Smoking out the bad actors: Risk analysis in the age of the microcomputer. 325-344 - Esther H. Highland:

Abstracts of recent articles and literature. 353-361
Volume 8, Number 5, August 1989
- Harold Joseph Highland:

From the editor. 366-367 - Harold Joseph Highland:

Random bits & bytes. 369-380 - Harry B. DeMaio:

Viruses-a management issue. 381-388 - Belden Menkus:

It's time to rethink data processing fire protection. 389-394 - G. J. Bologna:

Twenty-two reasons why MIS subordinates don't measure up to their bosses' expectations. 395-396 - Holger Bürk, Andreas Pfitzmann:

Digital payment systems enabling security and unobservability. 399-416 - W. H. Boshoff, Sebastiaan H. von Solms:

A path context model for addressing security in potentially non-secure environments. 417-425 - Simon R. Wiseman:

Preventing viruses in computer systems. 427-432 - Karin P. Badenhorst, Jan H. P. Eloff:

Framework of a methodology for the life cycle of computer security in an organization. 433-442 - Esther H. Highland:

Abstracts of recent articles and literature. 445-455
Volume 8, Number 6, October 1989
- Harold Joseph Highland:

From the editor. 458-459 - Harold Joseph Highland:

Random bits & bytes. 460-478 - Phillip E. Gardner:

Evaluation of five risk assessment programs. 479-485 - Belden Menkus:

The employee's role in protecting information assets. 487-492 - C. L. Harrold:

An introduction to the SMITE approach to secure computing. 495-505 - Raju Ramaswamy:

Placement of data integrity security services in open systems interconnection architecture. 507-516 - Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham:

SODA: A secure object-oriented database system. 517-533 - Esther H. Highland:

Abstracts of recent articles and literature. 537-546
Volume 8, Number 7, November 1989
- Harold Joseph Highland:

Random bits & bytes. 553-561 - Harold Joseph Highland:

Secret disk II - administrator. 563-568 - Bruce L. Riddle, Murray S. Miron, Judith A. Semo:

Passwords in use in a university timesharing environment. 569-579 - Belden Menkus:

Computer-related fire problems revisited. 581-586 - David L. Jobusch, Arthur E. Oldehoeft:

A survey of password mechanisms: Weaknesses and potential improvements. Part 1. 587-604 - Khosrow Dehnad:

A simple way of improving the login security. 607-611 - Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos:

A methodology for penetration testing. 613-620 - Dieter Bong, Christoph Ruland

:
Optimized software implementations of the modular exponentiation on general purpose microprocessors. 621-630
Volume 8, Number 8, December 1989
- Harold Joseph Highland:

From the editor. 644-646 - Harold Joseph Highland:

Random bits & bytes. 647-657 - Harold Joseph Highland:

Datacrime virus and new anti-virus products. 659-661 - Charles Preston:

Review of VIRUSCAN. 663-668 - Harold Joseph Highland:

VCHECKER - a virus search program. 669-674 - David L. Jobusch, Arthur E. Oldehoeft:

A survey of password mechanisms: Weaknesses and potential improvements. Part 2. 675-689 - Vijay Varadharajan:

Verification of network security protocols. 693-708 - Raju Ramaswamy:

Security architecture for data transfer through TCP/IP protocols. 709-720 - Bhavani M. Thuraisingham:

A functional view of multilevel databases. 721-730

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














