export record
dblp key:
journals/compsec/JonesATC93 share record
persistent URL:
Mary C. Jones , Kirk P. Arnett , Jeung-tai Eddie Tang , Nian-Shin Chen : Perceptions of computer viruses: a cross-cultural assessment. Comput. Secur. 12 (2 ) : 191-197 (1993 )export record
dblp key:
journals/compsec/Kensey93 share record
persistent URL:
Michael F. Kensey : Computer viruses - Towards better solutions. Comput. Secur. 12 (6 ) : 536-541 (1993 )export record
dblp key:
journals/compsec/Koerner93 share record
persistent URL:
Frank Koerner : System threats and vulnerabilities and the contrary principle. Comput. Secur. 12 (8 ) : 775-779 (1993 )export record
dblp key:
journals/compsec/LabuschagneR93 share record
persistent URL:
Frans Labuschagne , Jan Roos : Data security in X.25 networks. Comput. Secur. 12 (5 ) : 469-475 (1993 )export record
dblp key:
journals/compsec/Lawrence93 share record
persistent URL:
L. G. Lawrence : The role of roles. Comput. Secur. 12 (1 ) : 15-21 (1993 )export record
dblp key:
journals/compsec/Lawrence93a share record
persistent URL:
L. G. Lawrence : Digital signatures - Explanation and usage. Comput. Secur. 12 (3 ) : 230-233 (1993 )export record
dblp key:
journals/compsec/LongstaffS93 share record
persistent URL:
Thomas A. Longstaff , E. Eugene Schultz : Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. Comput. Secur. 12 (1 ) : 61-77 (1993 )share record
persistent URL:
Teresa F. Lunt : A survey of intrusion detection techniques. Comput. Secur. 12 (4 ) : 405-418 (1993 )share record
persistent URL:
John Meyer : The 1993 IFIP Kristian Beckman Award. Comput. Secur. 12 (4 ) : 338-340 (1993 )export record
dblp key:
journals/compsec/Moseley93 share record
persistent URL:
David Moseley : Public key management for X.25 network security. Comput. Secur. 12 (2 ) : 128-133 (1993 )export record
dblp key:
journals/compsec/Norman93 share record
persistent URL:
Geoff Norman : Disaster recovery after downsizing. Comput. Secur. 12 (3 ) : 225-229 (1993 )export record
dblp key:
journals/compsec/Obaidat93 share record
persistent URL:
Mohammad S. Obaidat : A methodology for improving computer access security. Comput. Secur. 12 (7 ) : 657-662 (1993 )share record
persistent URL:
Jon Ølnes : EDIFACT security made simple - the EDIMED approach. Comput. Secur. 12 (8 ) : 765-774 (1993 )export record
dblp key:
journals/compsec/PfitzmannA93 share record
persistent URL:
Andreas Pfitzmann , Ralf Aßmann : More efficient software implementations of (generalized) DES. Comput. Secur. 12 (5 ) : 477-500 (1993 )share record
persistent URL:
Martin Plant : Getting management buy-in to IT security. Comput. Secur. 12 (7 ) : 623-626 (1993 )export record
dblp key:
journals/compsec/Pujals93 share record
persistent URL:
Joseph M. Pujals : Security and privacy. Comput. Secur. 12 (1 ) : 22-27 (1993 )export record
dblp key:
journals/compsec/Rangan93 share record
persistent URL:
P. Venkat Rangan : The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol. Comput. Secur. 12 (3 ) : 305-314 (1993 )export record
dblp key:
journals/compsec/Reitenspiess93 share record
persistent URL:
Manfred Reitenspieß : Open system security standards. Comput. Secur. 12 (4 ) : 341-361 (1993 )export record
dblp key:
journals/compsec/Russell93 share record
persistent URL:
Selwyn Russell : Paradigms for verification of authorization at source of electronic documents in an integrated environment. Comput. Secur. 12 (6 ) : 542-549 (1993 )export record
dblp key:
journals/compsec/SandhuS93 share record
persistent URL:
Ravi S. Sandhu , Gurpreet S. Suri : A distributed capability-based architecture for the transform model. Comput. Secur. 12 (3 ) : 285-303 (1993 )export record
dblp key:
journals/compsec/Schramm93 share record
persistent URL:
Christof Schramm : Added-on security for MVS: weaknesses and measures. Comput. Secur. 12 (4 ) : 379-388 (1993 )export record
dblp key:
journals/compsec/SlackU93 share record
persistent URL:
James M. Slack , Elizabeth A. Unger : Integrity in object-oriented database systems. Comput. Secur. 12 (4 ) : 389-404 (1993 )export record
dblp key:
journals/compsec/SpaffordW93 share record
persistent URL:
Eugene H. Spafford , Stephen A. Weeber : Software forensics: Can we track code to its authors? Comput. Secur. 12 (6 ) : 585-595 (1993 )share record
persistent URL:
Stanley H. Stahl : Information security in workstation environments. Comput. Secur. 12 (2 ) : 117-122 (1993 )share record
persistent URL:
Barbara B. Di Turi : Security for EDIFACT messages. Comput. Secur. 12 (5 ) : 447-455 (1993 )export record
dblp key:
journals/compsec/VaughnSU93 share record
persistent URL:
Rayford B. Vaughn , Hossein Saiedian , Elizabeth A. Unger : A survey of security issues in office computation and the application of secure computing models to office systems. Comput. Secur. 12 (1 ) : 79-97 (1993 )export record
dblp key:
journals/compsec/VoasPC93 share record
persistent URL:
Jeffrey M. Voas , Jeffery E. Payne , Frederick B. Cohen : A model for detecting the existence of software corruption in real time. Comput. Secur. 12 (3 ) : 275-283 (1993 )share record
persistent URL:
Charles Cresson Wood : Duress terminations and information security. Comput. Secur. 12 (6 ) : 527-535 (1993 )share record
persistent URL:
Charles Cresson Wood : Principles of secure information systems design with groupware examples. Comput. Secur. 12 (7 ) : 663-678 (1993 )share record
persistent URL:
Charles Cresson Wood , William W. Banks Jr. : Human error: an overlooked but significant information security problem. Comput. Secur. 12 (1 ) : 51-60 (1993 )