Search dblp for Publications

export results for "toc:db/journals/compsec/compsec12.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AbramsALLW93,
  author       = {Marshall D. Abrams and
                  Edward Amoroso and
                  Leonard J. LaPadula and
                  Teresa F. Lunt and
                  James G. Williams},
  title        = {Report of an integrity research study group},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {679--689},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90085-J},
  doi          = {10.1016/0167-4048(93)90085-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsALLW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AllinsonBD93,
  author       = {Caroline Allinson and
                  Helen Bergen and
                  Ed Dawson},
  title        = {Message collision in block ciphers with message authentication},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {781--787},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90044-6},
  doi          = {10.1016/0167-4048(93)90044-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AllinsonBD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BergenH93,
  author       = {Helen A. Bergen and
                  James M. Hogan},
  title        = {A chosen plaintext attack on an adaptive arithmetic coding compression
                  algorithm},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {157--167},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90099-Q},
  doi          = {10.1016/0167-4048(93)90099-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BergenH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Black93,
  author       = {David K. Black},
  title        = {The Digital Signature Standard: Overview and current status},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {437--446},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90062-A},
  doi          = {10.1016/0167-4048(93)90062-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Black93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaelliGO93,
  author       = {William J. Caelli and
                  Ian G. Graham and
                  Luke O'Connor},
  title        = {Cryptographic Application Programming Interfaces (APIs)},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {640--645},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90079-K},
  doi          = {10.1016/0167-4048(93)90079-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaelliGO93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Clyde93,
  author       = {Robert A. Clyde},
  title        = {DECnet security (Not necessarily an oxymoron)},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {123--127},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90091-I},
  doi          = {10.1016/0167-4048(93)90091-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Clyde93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen93,
  author       = {Frederick B. Cohen},
  title        = {Operating system protection through program evolution},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {565--584},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90054-9},
  doi          = {10.1016/0167-4048(93)90054-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CollinsM93,
  author       = {Brian S. Collins and
                  Steve Mathews},
  title        = {Securing your business process},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {629--633},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90077-I},
  doi          = {10.1016/0167-4048(93)90077-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CollinsM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Donovan93,
  author       = {Steve Donovan},
  title        = {Security of PCs in a distributed environment},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {28--31},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90006-Q},
  doi          = {10.1016/0167-4048(93)90006-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Donovan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EloffLB93,
  author       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Karin P. Badenhorst},
  title        = {A comparative framework for risk analysis methods},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {597--603},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90056-B},
  doi          = {10.1016/0167-4048(93)90056-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EloffLB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Fagan93,
  author       = {Peter Fagan},
  title        = {Organizational issues in {IT} security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {710--715},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90033-2},
  doi          = {10.1016/0167-4048(93)90033-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Fagan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Fernandez-GonzalezAR93,
  author       = {J. Fern{\'{a}}ndez{-}Gonz{\'{a}}lez and
                  Gordon B. Agnew and
                  Arturo Ribagorda},
  title        = {Encryption and error correction codes for reliable file storage},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {501--510},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90070-L},
  doi          = {10.1016/0167-4048(93)90070-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Fernandez-GonzalezAR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FitchH93,
  author       = {John A. Fitch III and
                  Lance J. Hoffman},
  title        = {A shortest path network security model},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {169--189},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90100-J},
  doi          = {10.1016/0167-4048(93)90100-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FitchH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GollmannBD93,
  author       = {Dieter Gollmann and
                  Thomas Beth and
                  Frank Damm},
  title        = {Authentication services in distributed systems},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {753--764},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90041-3},
  doi          = {10.1016/0167-4048(93)90041-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GollmannBD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hardy93,
  author       = {Gary Hardy},
  title        = {Commercial accreditation of information security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {716--729},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90034-3},
  doi          = {10.1016/0167-4048(93)90034-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hardy93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein93,
  author       = {Edwin B. Heinlein},
  title        = {Recovery management},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {334--337},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein93a,
  author       = {Edwin B. Heinlein},
  title        = {World Trade Center - {A} retrospective},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {435--436},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90061-9},
  doi          = {10.1016/0167-4048(93)90061-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein93b,
  author       = {Edwin B. Heinlein},
  title        = {I worked with Murphy},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {627--628},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90076-H},
  doi          = {10.1016/0167-4048(93)90076-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein93b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {4--14},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93a,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {106--116},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90089-N},
  doi          = {10.1016/0167-4048(93)90089-N},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93b,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {216--224},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93c,
  author       = {Harold Joseph Highland},
  title        = {Conference report},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {249--253},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90111-H},
  doi          = {10.1016/0167-4048(93)90111-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93d,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {424--433},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93e,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {518--526},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93f,
  author       = {Harold Joseph Highland},
  title        = {IFIP/Sec '93 conference report},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {550--555},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90050-F},
  doi          = {10.1016/0167-4048(93)90050-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93g,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {612--622},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93h,
  author       = {Harold Joseph Highland},
  title        = {A view of information security tomorrow},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {634--639},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90078-J},
  doi          = {10.1016/0167-4048(93)90078-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93i,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {698--709},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90032-Z},
  doi          = {10.1016/0167-4048(93)90032-Z},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland93j,
  author       = {Harold Joseph Highland},
  title        = {16th national computer security conference},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {730--734},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90035-4},
  doi          = {10.1016/0167-4048(93)90035-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland93j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HochbergJSMDF93,
  author       = {Judith Hochberg and
                  Kathleen A. Jackson and
                  Cathy A. Stallings and
                  J. F. McClary and
                  David H. DuBois and
                  Josephine Ford},
  title        = {{NADIR:} An automated system for detecting network intrusion and misuse},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {235--248},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90110-Q},
  doi          = {10.1016/0167-4048(93)90110-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HochbergJSMDF93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JonesATC93,
  author       = {Mary C. Jones and
                  Kirk P. Arnett and
                  Jeung{-}tai Eddie Tang and
                  Nian{-}Shin Chen},
  title        = {Perceptions of computer viruses: a cross-cultural assessment},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {191--197},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90101-A},
  doi          = {10.1016/0167-4048(93)90101-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JonesATC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kensey93,
  author       = {Michael F. Kensey},
  title        = {Computer viruses - Towards better solutions},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {536--541},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90048-A},
  doi          = {10.1016/0167-4048(93)90048-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kensey93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Koerner93,
  author       = {Frank Koerner},
  title        = {System threats and vulnerabilities and the contrary principle},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {775--779},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90043-5},
  doi          = {10.1016/0167-4048(93)90043-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Koerner93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LabuschagneR93,
  author       = {Frans Labuschagne and
                  Jan Roos},
  title        = {Data security in {X.25} networks},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {469--475},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90068-G},
  doi          = {10.1016/0167-4048(93)90068-G},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LabuschagneR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lawrence93,
  author       = {L. G. Lawrence},
  title        = {The role of roles},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {15--21},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90004-O},
  doi          = {10.1016/0167-4048(93)90004-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lawrence93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lawrence93a,
  author       = {L. G. Lawrence},
  title        = {Digital signatures - Explanation and usage},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {230--233},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90109-I},
  doi          = {10.1016/0167-4048(93)90109-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lawrence93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LongstaffS93,
  author       = {Thomas A. Longstaff and
                  E. Eugene Schultz},
  title        = {Beyond preliminary analysis of the {WANK} and {OILZ} worms: a case
                  study of malicious code},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {61--77},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90013-U},
  doi          = {10.1016/0167-4048(93)90013-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LongstaffS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lunt93,
  author       = {Teresa F. Lunt},
  title        = {A survey of intrusion detection techniques},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {405--418},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90029-5},
  doi          = {10.1016/0167-4048(93)90029-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lunt93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Meyer93,
  author       = {John Meyer},
  title        = {The 1993 {IFIP} Kristian Beckman Award},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {338--340},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Meyer93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Moseley93,
  author       = {David Moseley},
  title        = {Public key management for {X.25} network security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {128--133},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90092-J},
  doi          = {10.1016/0167-4048(93)90092-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Moseley93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Norman93,
  author       = {Geoff Norman},
  title        = {Disaster recovery after downsizing},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {225--229},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90108-H},
  doi          = {10.1016/0167-4048(93)90108-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Norman93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Obaidat93,
  author       = {Mohammad S. Obaidat},
  title        = {A methodology for improving computer access security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {657--662},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90083-H},
  doi          = {10.1016/0167-4048(93)90083-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Obaidat93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Olnes93,
  author       = {Jon {\O}lnes},
  title        = {{EDIFACT} security made simple - the {EDIMED} approach},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {8},
  pages        = {765--774},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90042-4},
  doi          = {10.1016/0167-4048(93)90042-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Olnes93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PfitzmannA93,
  author       = {Andreas Pfitzmann and
                  Ralf A{\ss}mann},
  title        = {More efficient software implementations of (generalized) {DES}},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {477--500},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90069-H},
  doi          = {10.1016/0167-4048(93)90069-H},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PfitzmannA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Plant93,
  author       = {Martin Plant},
  title        = {Getting management buy-in to {IT} security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {623--626},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90075-G},
  doi          = {10.1016/0167-4048(93)90075-G},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Plant93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pujals93,
  author       = {Joseph M. Pujals},
  title        = {Security and privacy},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {22--27},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90005-P},
  doi          = {10.1016/0167-4048(93)90005-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pujals93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Rangan93,
  author       = {P. Venkat Rangan},
  title        = {The authenticated datagram protocol: {A} high performance, subtransport
                  level, secure communication protocol},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {305--314},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90119-P},
  doi          = {10.1016/0167-4048(93)90119-P},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Rangan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Reitenspiess93,
  author       = {Manfred Reitenspie{\ss}},
  title        = {Open system security standards},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {341--361},
  year         = {1993},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Reitenspiess93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Russell93,
  author       = {Selwyn Russell},
  title        = {Paradigms for verification of authorization at source of electronic
                  documents in an integrated environment},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {542--549},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90049-B},
  doi          = {10.1016/0167-4048(93)90049-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Russell93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SandhuS93,
  author       = {Ravi S. Sandhu and
                  Gurpreet S. Suri},
  title        = {A distributed capability-based architecture for the transform model},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {285--303},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90118-O},
  doi          = {10.1016/0167-4048(93)90118-O},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SandhuS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schramm93,
  author       = {Christof Schramm},
  title        = {Added-on security for {MVS:} weaknesses and measures},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {379--388},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90027-3},
  doi          = {10.1016/0167-4048(93)90027-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schramm93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SlackU93,
  author       = {James M. Slack and
                  Elizabeth A. Unger},
  title        = {Integrity in object-oriented database systems},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {389--404},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90028-4},
  doi          = {10.1016/0167-4048(93)90028-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SlackU93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpaffordW93,
  author       = {Eugene H. Spafford and
                  Stephen A. Weeber},
  title        = {Software forensics: Can we track code to its authors?},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {585--595},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90055-A},
  doi          = {10.1016/0167-4048(93)90055-A},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpaffordW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Stahl93,
  author       = {Stanley H. Stahl},
  title        = {Information security in workstation environments},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {117--122},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90090-R},
  doi          = {10.1016/0167-4048(93)90090-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Stahl93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Turi93,
  author       = {Barbara B. Di Turi},
  title        = {Security for {EDIFACT} messages},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {447--455},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90063-B},
  doi          = {10.1016/0167-4048(93)90063-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Turi93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VaughnSU93,
  author       = {Rayford B. Vaughn and
                  Hossein Saiedian and
                  Elizabeth A. Unger},
  title        = {A survey of security issues in office computation and the application
                  of secure computing models to office systems},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {79--97},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90014-V},
  doi          = {10.1016/0167-4048(93)90014-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VaughnSU93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VoasPC93,
  author       = {Jeffrey M. Voas and
                  Jeffery E. Payne and
                  Frederick B. Cohen},
  title        = {A model for detecting the existence of software corruption in real
                  time},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {275--283},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90117-N},
  doi          = {10.1016/0167-4048(93)90117-N},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VoasPC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood93,
  author       = {Charles Cresson Wood},
  title        = {Duress terminations and information security},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {527--535},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90047-9},
  doi          = {10.1016/0167-4048(93)90047-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood93a,
  author       = {Charles Cresson Wood},
  title        = {Principles of secure information systems design with groupware examples},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {7},
  pages        = {663--678},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90084-I},
  doi          = {10.1016/0167-4048(93)90084-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WoodB93,
  author       = {Charles Cresson Wood and
                  William W. Banks Jr.},
  title        = {Human error: an overlooked but significant information security problem},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {51--60},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90012-T},
  doi          = {10.1016/0167-4048(93)90012-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WoodB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics