


default search action
Computers & Security, Volume 9
Volume 9, Number 1, February 1990
- Harold Joseph Highland:

Random bits & bytes. 4-11 - Charles Cresson Wood:

Principles of secure information systems design. 13-24 - Bernard P. Zajac Jr.:

Computer viruses: Can they be prevented? 25-31 - Charlotte Klopp:

Software vendors capitalize on security needs. 33-35 - Paul Evans, Tina Monk:

Conference report: COMPSEC '89. 41-44 - John M. Carroll:

Conference report: 2300 brave virus threat to attend national security conference. 45-49 - Peter Smulders:

The threat of information theft by reception of electromagnetic radiation from RS-232 cables. 53-58 - Lindsay C. J. Mercer:

Tailor-made auditing of information systems for the detection of fraud. 59-66 - John Burns, Chris J. Mitchell

:
A security scheme for resource sharing over a network. 67-75 - Raju Ramaswamy:

A key management algorithm for secure communication in open systems interconnection architecture. 77-84
Volume 9, Number 2, April 1990
- Harold Joseph Highland:

Random bits & bytes. 102-109 - Belden Menkus:

How an "audit trail" aids in maintaining information integrity...as illustrated in retailing. 111-116 - Kirk W. Tabbey:

Computer crime: "Preparing the computer specific search warrant". 117-123 - I. S. Herschberg, Ronald Paans:

Friday the 13th, facts and fancies. 125-130 - Ghannam M. Al-Dossary:

Computer virus prevention and containment on mainframes. 131-137 - Charlotte Klopp:

Microcomputer security systems attempt to lock up desktops. 139-141 - Josep Domingo-Ferrer, Llorenç Huguet i Rotger:

Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures. 145-152 - Moshe Zviran, James C. Hoge, Val A. Micucci:

SPAN - a DSS for security plan analysis. 153-160 - Ronald Paans, I. S. Herschberg:

Auditing the change management process. 161-174
Volume 9, Number 3, May 1990
- Harold Joseph Highland:

Random bits & bytes. 196-208 - Belden Menkus:

Understanding data communication security vulnerabilities. 209-213 - Sanford Sherizen:

Criminological concepts and research findings relevant for improving computer crime control. 215-222 - I. S. Herschberg, Ronald Paans:

Sloppy, sloppier, sloppiest. 223-228 - Charlotte Klopp:

More options for physical access control. 229-232 - Claude Laferriere:

A discussion of implementation strategies for secure database management systems. 235-244 - Sead Muftic:

Transaction protection by "antennas". 245-255 - Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle:

Cryptanalysis of a fast cryptographic checksum algorithm. 257-262
Volume 9, Number 4, June 1990
- Harold Joseph Highland:

Random bits & bytes. 282-294 - Steven Homer:

Setting standards in Europe. 295-300 - Bernard P. Zajac Jr.:

People: The "other" side of computer security. 301-303 - Charlotte Klopp:

Vulnerability awareness improves contingency planning. 309-311 - Paul Evans:

How can professional standards be set and maintained? 313-316 - Robert Cole:

A model for security in distributed systems. 319-330 - Lindsay C. J. Mercer:

Fraud detection via regression analysis. 331-338 - Karin P. Badenhorst, Jan H. P. Eloff:

Computer security methodology: Risk analysis and project definition. 339-346
Volume 9, Number 5, August 1990
- Harold Joseph Highland:

Random bits & bytes. 366-378 - Peter Winters:

Secure systems design - an evolving national strategy. 379-389 - Hans Gliss:

East Germany - haven for software piracy. 391-393 - Charles Cresson Wood:

How many information security staff people should you have? 395-402 - Jon David:

The numbers game. 403-407 - Scott K. Jones, Clinton E. White Jr.:

The IPM model of computer virus management. 411-417 - Ivor Lloyd:

Software evaluation in high integrity systems. 419-429 - Robert A. McKosky, Sajjan G. Shiva:

A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems. 431-446 - Roger R. Schell, David Bailey:

Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989. 459-460
Volume 9, Number 6, October 1990
- Harold Joseph Highland:

Random bits & bytes. 470-482 - Belden Menkus:

Why data communications are insecure. 483-487 - John M. Carroll:

Security and credibility in an information-intensive society. 489-498 - Tanya Candia:

How VMS keeps out intruders. 499-502 - Bernard P. Zajac Jr.:

The 1990s - what will they hold? 503-507 - Keith Jackson:

Confessions of a security consultant. 509-511 - T. A. Parker:

Application access control standards for distributed systems. 519-528 - Simon R. Wiseman:

Control of confidentiality in databases. 529-537 - Lein Harn, Hung-Yu Lin:

A cryptographic key generation scheme for multilevel data security. 539-546 - Charles Creson Wood:

Spectacular computer crimes - what they are and how they cost American business half a billion dollars a year! : Buck Bloombecker, Don Jones-Irwin, Homewood, IL, 1990. 557
Volume 9, Number 7, November 1990
- Harold Joseph Highland:

Random bits & bytes. 570-586 - Belden Menkus:

The complexity of "long haul" data communication security. 587-592 - Jon David:

The Novell virus. 593-599 - Bernard P. Zajac Jr.:

Interview with Clifford Stoll. 601-603 - Simon Banks:

Security policy. 605-610 - John M. Carroll:

"Do-it-yourself" cryptography. 613-619 - Claude Laferriere, G. Owen Higginson, Gordon G. Bell:

Security architectures for textual databases. 621-630 - Simon J. Shepherd, Peter W. Sanders, A. Patel:

A comprehensive security system - the concepts, agents and protocols. 631-643
Volume 9, Number 8, December 1990
- Harold Joseph Highland:

Random bits & bytes. 660-675 - Charles Cresson Wood:

Fifteen major forces driving the civilian information security market. 677-686 - Jack Bologna:

Ethical issues of the information era. 689-692 - David L. Lathrop:

Perestroika and its implications for computer security in the U.S.S.R. 693-696 - Ingrid M. Olson, Marshall D. Abrams:

Computer access control policy choices. 699-714 - Holger Bürk, Andreas Pfitzmann:

Value exchange systems enabling security and unobservability. 715-721 - Moshe Zviran, William J. Haga:

Cognitive passwords: The key to easy access control. 723-736

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














