Search dblp for Publications

export results for "toc:db/journals/compsec/compsec4.bht:"

 download as .bib file

@article{DBLP:journals/compsec/Auerbach85,
  author       = {Isaac L. Auerbach},
  title        = {Professional responsibility for information privacy},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {103--107},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90014-8},
  doi          = {10.1016/0167-4048(85)90014-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Auerbach85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bruyne85,
  author       = {Pieter de Bruyne},
  title        = {Signature verification using holistic measures},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {309--315},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90049-5},
  doi          = {10.1016/0167-4048(85)90049-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bruyne85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarrollI85,
  author       = {John M. Carroll and
                  W. R. Mac Iver},
  title        = {{COSSAC:} a framework for analyzing and configuring secure computer
                  facilities},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {5--12},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90004-5},
  doi          = {10.1016/0167-4048(85)90004-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarrollI85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cerullo85,
  author       = {Michael J. Cerullo},
  title        = {General controls in computer systems},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {33--45},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90007-0},
  doi          = {10.1016/0167-4048(85)90007-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cerullo85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Chamoux85,
  author       = {Jean{-}Pierre Chamoux},
  title        = {Data security and confidentiality in Europe},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {207--210},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90029-X},
  doi          = {10.1016/0167-4048(85)90029-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Chamoux85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen85,
  author       = {Fred Cohen},
  title        = {A secure computer network design},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {189--205},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90028-8},
  doi          = {10.1016/0167-4048(85)90028-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Croix85,
  author       = {A. J. du Croix},
  title        = {Data sharing and access protection in business system 12},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {317--323},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90050-1},
  doi          = {10.1016/0167-4048(85)90050-1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Croix85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Eck85,
  author       = {Wim van Eck},
  title        = {Electromagnetic radiation from video display units: An eavesdropping
                  risk?},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {269--286},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90046-X},
  doi          = {10.1016/0167-4048(85)90046-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Eck85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Eloff85,
  author       = {Jan H. P. Eloff},
  title        = {The development of a specification language for a computer security
                  system},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {143--147},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90019-7},
  doi          = {10.1016/0167-4048(85)90019-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Eloff85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalM85,
  author       = {Graham Gal and
                  William E. McCarthy},
  title        = {Specification of internal accounting controls in a database environment},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {23--32},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90006-9},
  doi          = {10.1016/0167-4048(85)90006-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85,
  author       = {Harold Joseph Highland},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--2},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90002-1},
  doi          = {10.1016/0167-4048(85)90002-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85a,
  author       = {Harold Joseph Highland},
  title        = {The first national computer security conference},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {65--73},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90009-4},
  doi          = {10.1016/0167-4048(85)90009-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85b,
  author       = {Harold Joseph Highland},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {101--102},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90013-6},
  doi          = {10.1016/0167-4048(85)90013-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85c,
  author       = {Harold Joseph Highland},
  title        = {Microcomputer security: Data protection techniques},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {123--134},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90016-1},
  doi          = {10.1016/0167-4048(85)90016-1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85d,
  author       = {Harold Joseph Highland},
  title        = {Editorial : Office automation or on the value of being a dinosaur},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {185--186},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90026-4},
  doi          = {10.1016/0167-4048(85)90026-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85e,
  author       = {Harold Joseph Highland},
  title        = {{U.S.} computer crime legislation highlighted in special report},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {245--246},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90036-7},
  doi          = {10.1016/0167-4048(85)90036-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85f,
  author       = {Harold Joseph Highland},
  title        = {Kahn on codes: Secrets of the new cryptology : David Kahn New York:
                  Macmillan Publishing Company, 1984. 344 + viii pages, {\textdollar}19.95},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {247},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90037-9},
  doi          = {10.1016/0167-4048(85)90037-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85g,
  author       = {Harold Joseph Highland},
  title        = {Managing risk: {A} computer-aided strategy : John M. Carroll Boston:
                  Butterworths, 1984. 277 + xvi pages, {\textdollar}18.95},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {247--248},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90038-0},
  doi          = {10.1016/0167-4048(85)90038-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85h,
  author       = {Harold Joseph Highland},
  title        = {Communication regulation and international business : Juan F. Rada
                  and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 +
                  x pages, Dfl. 120.00/US {\textdollar}46.25},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {249},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90040-9},
  doi          = {10.1016/0167-4048(85)90040-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85i,
  author       = {Esther Harris Highland},
  title        = {Transborder data flows: access to the international on-line data-base
                  market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/
                  {US} {\textdollar}28.75},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {249},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90041-0},
  doi          = {10.1016/0167-4048(85)90041-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85j,
  author       = {Esther Harris Highland},
  title        = {Proceedings of the seventh computer security group conference : Washington:
                  {US} government printing office, 1984 - 776-101/1027. 115 pages},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {249--250},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90042-2},
  doi          = {10.1016/0167-4048(85)90042-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland85k,
  author       = {Harold Joseph Highland},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {267--268},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90045-8},
  doi          = {10.1016/0167-4048(85)90045-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland85k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HovingE85,
  author       = {Per L. Hoving and
                  Johan Ess{\'{e}}n},
  title        = {Minutes from the first meeting of {TC} 11, security and protection
                  in information processing systems},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {149--152},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90020-3},
  doi          = {10.1016/0167-4048(85)90020-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HovingE85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus85,
  author       = {Belden Menkus},
  title        = {The {EDP} auditor's role in computer security},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {135--138},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90017-3},
  doi          = {10.1016/0167-4048(85)90017-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus85a,
  author       = {Belden Menkus},
  title        = {The impact of the Bell system breakup on {DP} disaster recovery planning},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {219--222},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90031-8},
  doi          = {10.1016/0167-4048(85)90031-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Miller85,
  author       = {James E. Miller},
  title        = {Transaction controls: Steps to take after the equipment has been secured},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {139--141},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90018-5},
  doi          = {10.1016/0167-4048(85)90018-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Miller85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PieprzykR85,
  author       = {J{\'{o}}zef P. Pieprzyk and
                  Dominik Rutkowski},
  title        = {Modular design of information encipherment for computer systems},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {211--218},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90030-6},
  doi          = {10.1016/0167-4048(85)90030-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PieprzykR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PieprzykR85a,
  author       = {J{\'{o}}zef P. Pieprzyk and
                  Dominik Rutkowski},
  title        = {Design of public key cryptosystems using idempotent elements},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {297--308},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90048-3},
  doi          = {10.1016/0167-4048(85)90048-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PieprzykR85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schweitzer85,
  author       = {James A. Schweitzer},
  title        = {A management view: computer security as a discretionary decision},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {13--22},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90005-7},
  doi          = {10.1016/0167-4048(85)90005-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schweitzer85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Serpell85,
  author       = {Stephen C. Serpell},
  title        = {Cryptographic equipment security: a code of practice},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {47--64},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90008-2},
  doi          = {10.1016/0167-4048(85)90008-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Serpell85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VoydockK85,
  author       = {Victor L. Voydock and
                  Stephen T. Kent},
  title        = {Security mechanisms in a transport layer protocol},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {325--341},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90051-3},
  doi          = {10.1016/0167-4048(85)90051-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VoydockK85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wong85,
  author       = {Ken Wong},
  title        = {Computer crime - Risk management and computer security},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {287--295},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90047-1},
  doi          = {10.1016/0167-4048(85)90047-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wong85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood85,
  author       = {Charles Cresson Wood},
  title        = {Floppy diskette security measures},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {223--228},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90032-X},
  doi          = {10.1016/0167-4048(85)90032-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood85a,
  author       = {Charles Cresson Wood},
  title        = {Security for computer networks : {D.W.} Davies and {W.L.} Price New
                  York: John Wiley and Sons, 1984. 386 + xix pages, {\textdollar}19.50},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {248--249},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90039-2},
  doi          = {10.1016/0167-4048(85)90039-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Yeo85,
  author       = {Gee Kin Yeo},
  title        = {Incorporating access control in forms systems},
  journal      = {Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {109--122},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-4048(85)90015-X},
  doi          = {10.1016/0167-4048(85)90015-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Yeo85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics