Search dblp for Publications

export results for "toc:db/journals/compsec/compsec13.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BadenhorstE94,
  author       = {Karin P. Badenhorst and
                  Jan H. P. Eloff},
  title        = {{TOPM:} a formal approach to the optimization of information technology
                  risk management},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {411--435},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90036-1},
  doi          = {10.1016/0167-4048(94)90036-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BadenhorstE94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BornS94,
  author       = {Eike Born and
                  Helmut G. Stiegler},
  title        = {Discretionary access control by means of usage conditions},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {437--450},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90037-X},
  doi          = {10.1016/0167-4048(94)90037-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BornS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangJB94,
  author       = {Chin{-}Chen Chang and
                  Jinn{-}Ke Jan and
                  Daniel J. Buehrer},
  title        = {A scheme to determine the relationship between two users in a hierarchy},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {255--261},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90079-5},
  doi          = {10.1016/0167-4048(94)90079-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangJB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangL94,
  author       = {Chin{-}Chin Chang and
                  Wen{-}Yuan Liao},
  title        = {A remote password authentication scheme based upon ElGamal's signature
                  scheme},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {137--144},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90063-9},
  doi          = {10.1016/0167-4048(94)90063-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangSW94,
  author       = {Chin{-}Chen Chang and
                  Jao{-}Ji Shen and
                  Tzong{-}Chen Wu},
  title        = {Access control with binary keys},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {681--686},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90050-7},
  doi          = {10.1016/0167-4048(94)90050-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangSW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenH94,
  author       = {Jau{-}Liang Chen and
                  Tzonelih Hwang},
  title        = {Identity-based conference key broadcast schemes with user authentication},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {53--57},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90095-7},
  doi          = {10.1016/0167-4048(94)90095-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Collinson94,
  author       = {Helen Collinson},
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {401--406},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Collinson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CourtneyW94,
  author       = {Robert H. Courtney and
                  Willis H. Ware},
  title        = {What do we mean by integrity?},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {206--208},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90070-1},
  doi          = {10.1016/0167-4048(94)90070-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CourtneyW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DawsonD94,
  author       = {Ed Dawson and
                  Diane M. Donovan},
  title        = {The breadth of Shamir's secret-sharing scheme},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {69--78},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90097-3},
  doi          = {10.1016/0167-4048(94)90097-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DawsonD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DenaultKGS94,
  author       = {Michel Denault and
                  Dimitris Karagiannis and
                  Dimitris Gritzalis and
                  Paul G. Spirakis},
  title        = {Intrusion detection: Approach and performance issues of the {SECURENET}
                  system},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {495--508},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90138-4},
  doi          = {10.1016/0167-4048(91)90138-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DenaultKGS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ganley94,
  author       = {Michael J. Ganley},
  title        = {Digital signatures and their uses},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {385--391},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90031-0},
  doi          = {10.1016/0167-4048(94)90031-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ganley94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GentileGGMV94,
  author       = {Francesco Gentile and
                  Luigi Giuri and
                  Franco Guida and
                  Emilio Montolivo and
                  Michele Volpe},
  title        = {Security evaluation in information technology standards},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {647--650},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90044-2},
  doi          = {10.1016/0167-4048(94)90044-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GentileGGMV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GustafsonDNC94,
  author       = {Helen Gustafson and
                  Ed Dawson and
                  Lauren Nielsen and
                  William J. Caelli},
  title        = {A computer package for measuring the strength of encryption algorithms},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {687--697},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90051-5},
  doi          = {10.1016/0167-4048(94)90051-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GustafsonDNC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HardjonoZS94,
  author       = {Thomas Hardjono and
                  Yuliang Zheng and
                  Jennifer Seberry},
  title        = {Database authentication revisited},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {573--580},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90008-6},
  doi          = {10.1016/0167-4048(94)90008-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HardjonoZS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarrisS94,
  author       = {Duncan Harris and
                  David Sidwell},
  title        = {Distributed database security},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {547--557},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90003-5},
  doi          = {10.1016/0167-4048(94)90003-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarrisS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein94,
  author       = {Edwin B. Heinlein},
  title        = {Communications, security, privacy and the law},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {119--121},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90058-2},
  doi          = {10.1016/0167-4048(94)90058-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein94a,
  author       = {Edwin B. Heinlein},
  title        = {17th National Computer Security Conference - An opinion},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {481--483},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90134-Y},
  doi          = {10.1016/0167-4048(91)90134-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {4--14},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94a,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {98--106},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90055-8},
  doi          = {10.1016/0167-4048(94)90055-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94b,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {192--205},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94c,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {278--286},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94d,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {372--378},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94e,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {458--465},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94f,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {540--546},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland94g,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {622--627},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland94g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hoppe94,
  author       = {Norman Hopp{\'{e}}},
  title        = {Achieving consistent security controls throughout a multinational
                  organization},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {23--29},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90087-6},
  doi          = {10.1016/0167-4048(94)90087-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hoppe94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HudoklinS94,
  author       = {Alenka Hudoklin and
                  Branislav Smitek},
  title        = {Computer systems security in Slovenia},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {30--33},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90088-4},
  doi          = {10.1016/0167-4048(94)90088-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HudoklinS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kanungo94,
  author       = {Shivraj Kanungo},
  title        = {Identity authentication in heterogeneous computing environments: a
                  comparative study for an integrated framework},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {231--253},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90078-7},
  doi          = {10.1016/0167-4048(94)90078-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kanungo94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LadkinT94,
  author       = {Peter B. Ladkin and
                  Harold W. Thimbleby},
  title        = {Comments on a paper by Voas, Payne and Cohen: 'A model for detecting
                  the existence of software corruption in real time'},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {527--531},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90140-9},
  doi          = {10.1016/0167-4048(91)90140-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LadkinT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaihCC94,
  author       = {Chi{-}Sung Laih and
                  Wen{-}Hong Chiou and
                  Chin{-}Chen Chang},
  title        = {Authentication and protection of public keys},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {581--585},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90009-4},
  doi          = {10.1016/0167-4048(94)90009-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaihCC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Liaw94,
  author       = {Horng{-}Twu Liaw},
  title        = {A dynamic cryptographic key generation and information broadcasting
                  scheme in information systems},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {601--610},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90011-6},
  doi          = {10.1016/0167-4048(94)90011-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Liaw94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lillywhite94,
  author       = {Thomas Lillywhite},
  title        = {{IT} security standards and the adoption of a benchmarking approach},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {467--471},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90132-W},
  doi          = {10.1016/0167-4048(91)90132-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lillywhite94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LindgreenH94,
  author       = {Edo Roos Lindgreen and
                  I. S. Herschberg},
  title        = {On the validity of the Bell-La Padula model},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {317--333},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90023-X},
  doi          = {10.1016/0167-4048(94)90023-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LindgreenH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lindup94,
  author       = {Ken Lindup},
  title        = {The cyberpunk age},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {637--645},
  year         = {1994},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Lindup94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ListM94,
  author       = {William List and
                  Rob Melville},
  title        = {Integrity in information systems - Executive summary},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {295--301},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90018-3},
  doi          = {10.1016/0167-4048(94)90018-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ListM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LongleyV94,
  author       = {Dennis Longley and
                  S. Vasudevan},
  title        = {Effect of key generators on the automatic search for flaws in key
                  management schemes},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {335--347},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90024-8},
  doi          = {10.1016/0167-4048(94)90024-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LongleyV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LooiC94,
  author       = {Mark Looi and
                  William J. Caelli},
  title        = {A note on supplying a trusted clock via a secure device},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {611--613},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90012-4},
  doi          = {10.1016/0167-4048(94)90012-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LooiC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Magruder94,
  author       = {Scott Magruder},
  title        = {High-level language computer viruses - a new threat?},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {263--269},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90080-9},
  doi          = {10.1016/0167-4048(94)90080-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Magruder94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus94,
  author       = {Belden Menkus},
  title        = {The new importance of "business continuity" in data processing disaster
                  recovery planning},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {115--118},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90057-4},
  doi          = {10.1016/0167-4048(94)90057-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohammedD94,
  author       = {Imtiaz Mohammed and
                  David M. Dilts},
  title        = {Design for dynamic user-role-based security},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {661--671},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90048-5},
  doi          = {10.1016/0167-4048(94)90048-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MohammedD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MostertS94,
  author       = {D. N. J. Mostert and
                  Sebastiaan H. von Solms},
  title        = {A methodology to include computer security, safety and resilience
                  requirements as part of the user requirement},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {349--364},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90025-6},
  doi          = {10.1016/0167-4048(94)90025-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MostertS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Olnes94,
  author       = {Jon {\O}lnes},
  title        = {Development of security policies},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {628--636},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90042-6},
  doi          = {10.1016/0167-4048(94)90042-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Olnes94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PicciottoG94,
  author       = {Jeffrey Picciotto and
                  Richard D. Graubart},
  title        = {Extended labeling policies for enhanced application support},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {587--599},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90010-8},
  doi          = {10.1016/0167-4048(94)90010-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PicciottoG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Rihaczek94,
  author       = {Karl Rihaczek},
  title        = {Data interchange and legal security - signature surrogates},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {287--293},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90017-5},
  doi          = {10.1016/0167-4048(94)90017-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Rihaczek94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Russell94,
  author       = {Selwyn Russell},
  title        = {Audit-by-receiver paradigms for verification of authorization at source
                  of electronic documents},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {59--67},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90096-5},
  doi          = {10.1016/0167-4048(94)90096-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Russell94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Shain94,
  author       = {Michael Shain},
  title        = {Security issues with enterprise multimedia},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {15--22},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90086-8},
  doi          = {10.1016/0167-4048(94)90086-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Shain94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaoHW94,
  author       = {Bao{-}Min Shao and
                  Jing{-}Jang Hwang and
                  PeCheng Wang},
  title        = {Distributed assignment of cryptographic keys for access control in
                  a hierarchy},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {79--84},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90098-1},
  doi          = {10.1016/0167-4048(94)90098-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaoHW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsM94,
  author       = {Sebastiaan H. von Solms and
                  Isak van der Merwe},
  title        = {The management of computer security profiles using a role-oriented
                  approach},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {8},
  pages        = {673--680},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90049-3},
  doi          = {10.1016/0167-4048(94)90049-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sommer94,
  author       = {Peter Sommer},
  title        = {Industrial espionage: Analysing the risk},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {7},
  pages        = {558--563},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90004-3},
  doi          = {10.1016/0167-4048(94)90004-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sommer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpectorG94,
  author       = {Yishay Spector and
                  Jacob Ginzberg},
  title        = {Pass-sentence - a new approach to computer code},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {145--160},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90064-7},
  doi          = {10.1016/0167-4048(94)90064-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpectorG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Strous94,
  author       = {Leon Strous},
  title        = {Security evaluation criteria},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {379--384},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90030-2},
  doi          = {10.1016/0167-4048(94)90030-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Strous94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Svigals94,
  author       = {Jerome Svigals},
  title        = {Smartcards - {A} security assessment},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {107--114},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90056-6},
  doi          = {10.1016/0167-4048(94)90056-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Svigals94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Symonds94,
  author       = {Ian M. Symonds},
  title        = {Security in distributed and client/server systems - {A} management
                  view},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {473--480},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90133-X},
  doi          = {10.1016/0167-4048(91)90133-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Symonds94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Thuraisingham94,
  author       = {Bhavani Thuraisingham},
  title        = {Security issues for federated database systems},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {509--525},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(91)90139-5},
  doi          = {10.1016/0167-4048(91)90139-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Thuraisingham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Vazquez-Gomez94,
  author       = {Jos{\'{e}} V{\'{a}}zquez{-}G{\'{o}}mez},
  title        = {Multidomain security},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {161--184},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90065-5},
  doi          = {10.1016/0167-4048(94)90065-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Vazquez-Gomez94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood94,
  author       = {Charles Cresson Wood},
  title        = {Fifty ways to secure dial-up connections},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {209--215},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90071-X},
  doi          = {10.1016/0167-4048(94)90071-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac94,
  author       = {Bernard P. Zajac Jr.},
  title        = {Cost effectiveness of anti-viral scanners},
  journal      = {Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {392--400},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-4048(94)90032-9},
  doi          = {10.1016/0167-4048(94)90032-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics