export record
dblp key:
journals/compsec/JonesW90 share record
persistent URL:
Scott K. Jones , Clinton E. White Jr. : The IPM model of computer virus management. Comput. Secur. 9 (5 ) : 411-417 (1990 )share record
persistent URL:
Charlotte Klopp : Software vendors capitalize on security needs. Comput. Secur. 9 (1 ) : 33-35 (1990 )export record
dblp key:
journals/compsec/Klopp90a share record
persistent URL:
Charlotte Klopp : Microcomputer security systems attempt to lock up desktops. Comput. Secur. 9 (2 ) : 139-141 (1990 )export record
dblp key:
journals/compsec/Klopp90b share record
persistent URL:
Charlotte Klopp : More options for physical access control. Comput. Secur. 9 (3 ) : 229-232 (1990 )export record
dblp key:
journals/compsec/Klopp90c share record
persistent URL:
Charlotte Klopp : Vulnerability awareness improves contingency planning. Comput. Secur. 9 (4 ) : 309-311 (1990 )export record
dblp key:
journals/compsec/Laferriere90 share record
persistent URL:
Claude Laferriere : A discussion of implementation strategies for secure database management systems. Comput. Secur. 9 (3 ) : 235-244 (1990 )export record
dblp key:
journals/compsec/LaferriereHB90 share record
persistent URL:
Claude Laferriere , G. Owen Higginson , Gordon G. Bell : Security architectures for textual databases. Comput. Secur. 9 (7 ) : 621-630 (1990 )export record
dblp key:
journals/compsec/Lathrop90 share record
persistent URL:
David L. Lathrop : Perestroika and its implications for computer security in the U.S.S.R. Comput. Secur. 9 (8 ) : 693-696 (1990 )share record
persistent URL:
Ivor Lloyd : Software evaluation in high integrity systems. Comput. Secur. 9 (5 ) : 419-429 (1990 )export record
dblp key:
journals/compsec/McKoskyS90 share record
persistent URL:
Robert A. McKosky , Sajjan G. Shiva : A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems. Comput. Secur. 9 (5 ) : 431-446 (1990 )export record
dblp key:
journals/compsec/Menkus90 share record
persistent URL:
Belden Menkus : How an "audit trail" aids in maintaining information integrity...as illustrated in retailing. Comput. Secur. 9 (2 ) : 111-116 (1990 )export record
dblp key:
journals/compsec/Menkus90a share record
persistent URL:
Belden Menkus : Understanding data communication security vulnerabilities. Comput. Secur. 9 (3 ) : 209-213 (1990 )export record
dblp key:
journals/compsec/Menkus90b share record
persistent URL:
Belden Menkus : Why data communications are insecure. Comput. Secur. 9 (6 ) : 483-487 (1990 )export record
dblp key:
journals/compsec/Menkus90c share record
persistent URL:
Belden Menkus : The complexity of "long haul" data communication security. Comput. Secur. 9 (7 ) : 587-592 (1990 )export record
dblp key:
journals/compsec/Mercer90 share record
persistent URL:
Lindsay C. J. Mercer : Tailor-made auditing of information systems for the detection of fraud. Comput. Secur. 9 (1 ) : 59-66 (1990 )export record
dblp key:
journals/compsec/Mercer90a share record
persistent URL:
Lindsay C. J. Mercer : Fraud detection via regression analysis. Comput. Secur. 9 (4 ) : 331-338 (1990 )export record
dblp key:
journals/compsec/Muftic90 share record
persistent URL:
Sead Muftic : Transaction protection by "antennas". Comput. Secur. 9 (3 ) : 245-255 (1990 )export record
dblp key:
journals/compsec/OlsonA90 share record
persistent URL:
Ingrid M. Olson , Marshall D. Abrams : Computer access control policy choices. Comput. Secur. 9 (8 ) : 699-714 (1990 )export record
dblp key:
journals/compsec/PaansH90 share record
persistent URL:
Ronald Paans , I. S. Herschberg : Auditing the change management process. Comput. Secur. 9 (2 ) : 161-174 (1990 )export record
dblp key:
journals/compsec/Parker90 share record
persistent URL:
T. A. Parker : Application access control standards for distributed systems. Comput. Secur. 9 (6 ) : 519-528 (1990 )export record
dblp key:
journals/compsec/PreneelBGV90 share record
persistent URL:
Bart Preneel , Antoon Bosselaers , René Govaerts , Joos Vandewalle : Cryptanalysis of a fast cryptographic checksum algorithm. Comput. Secur. 9 (3 ) : 257-262 (1990 )export record
dblp key:
journals/compsec/Ramaswamy90 share record
persistent URL:
Raju Ramaswamy : A key management algorithm for secure communication in open systems interconnection architecture. Comput. Secur. 9 (1 ) : 77-84 (1990 )export record
dblp key:
journals/compsec/SchellB90 share record
persistent URL:
Roger R. Schell , David Bailey : Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989. Comput. Secur. 9 (5 ) : 459-460 (1990 )export record
dblp key:
journals/compsec/ShepherdSP90 share record
persistent URL:
Simon J. Shepherd , Peter W. Sanders , A. Patel : A comprehensive security system - the concepts, agents and protocols. Comput. Secur. 9 (7 ) : 631-643 (1990 )export record
dblp key:
journals/compsec/Sherizen90 share record
persistent URL:
Sanford Sherizen : Criminological concepts and research findings relevant for improving computer crime control. Comput. Secur. 9 (3 ) : 215-222 (1990 )export record
dblp key:
journals/compsec/Smulders90 share record
persistent URL:
Peter Smulders : The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Comput. Secur. 9 (1 ) : 53-58 (1990 )export record
dblp key:
journals/compsec/Tabbey90 share record
persistent URL:
Kirk W. Tabbey : Computer crime: "Preparing the computer specific search warrant". Comput. Secur. 9 (2 ) : 117-123 (1990 )export record
dblp key:
journals/compsec/Winters90 share record
persistent URL:
Peter Winters : Secure systems design - an evolving national strategy. Comput. Secur. 9 (5 ) : 379-389 (1990 )export record
dblp key:
journals/compsec/Wiseman90 share record
persistent URL:
Simon R. Wiseman : Control of confidentiality in databases. Comput. Secur. 9 (6 ) : 529-537 (1990 )share record
persistent URL:
Charles Cresson Wood : Principles of secure information systems design. Comput. Secur. 9 (1 ) : 13-24 (1990 )