Search dblp for Publications

export results for "toc:db/journals/compsec/compsec9.bht:"

 download as .bib file

@article{DBLP:journals/compsec/Al-Dossary90,
  author       = {Ghannam M. Al{-}Dossary},
  title        = {Computer virus prevention and containment on mainframes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {131--137},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90085-8},
  doi          = {10.1016/0167-4048(90)90085-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-Dossary90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BadenhorstE90,
  author       = {Karin P. Badenhorst and
                  Jan H. P. Eloff},
  title        = {Computer security methodology: Risk analysis and project definition},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {339--346},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90104-2},
  doi          = {10.1016/0167-4048(90)90104-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BadenhorstE90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Banks90,
  author       = {Simon Banks},
  title        = {Security policy},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {605--610},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90058-2},
  doi          = {10.1016/0167-4048(90)90058-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Banks90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna90,
  author       = {Jack Bologna},
  title        = {Ethical issues of the information era},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {689--692},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90110-F},
  doi          = {10.1016/0167-4048(90)90110-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurkP90,
  author       = {Holger B{\"{u}}rk and
                  Andreas Pfitzmann},
  title        = {Value exchange systems enabling security and unobservability},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {715--721},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90114-9},
  doi          = {10.1016/0167-4048(90)90114-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurkP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurnsM90,
  author       = {John Burns and
                  Chris J. Mitchell},
  title        = {A security scheme for resource sharing over a network},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {67--75},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90159-Q},
  doi          = {10.1016/0167-4048(90)90159-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurnsM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Candia90,
  author       = {Tanya Candia},
  title        = {How {VMS} keeps out intruders},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {499--502},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90125-D},
  doi          = {10.1016/0167-4048(90)90125-D},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Candia90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Carrol90,
  author       = {John M. Carroll},
  title        = {Conference report: 2300 brave virus threat to attend national security
                  conference},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {45--49},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90155-M},
  doi          = {10.1016/0167-4048(90)90155-M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Carrol90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Carroll90,
  author       = {John M. Carroll},
  title        = {Security and credibility in an information-intensive society},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {489--498},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90124-C},
  doi          = {10.1016/0167-4048(90)90124-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Carroll90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Carroll90a,
  author       = {John M. Carroll},
  title        = {"Do-it-yourself" cryptography},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {613--619},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90060-7},
  doi          = {10.1016/0167-4048(90)90060-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Carroll90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cole90,
  author       = {Robert Cole},
  title        = {A model for security in distributed systems},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {319--330},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90102-Y},
  doi          = {10.1016/0167-4048(90)90102-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cole90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/David90,
  author       = {Jon David},
  title        = {The numbers game},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {403--407},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90070-A},
  doi          = {10.1016/0167-4048(90)90070-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/David90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/David90a,
  author       = {Jon David},
  title        = {The Novell virus},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {593--599},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90056-Y},
  doi          = {10.1016/0167-4048(90)90056-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/David90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Domingo-FerrerR90,
  author       = {Josep Domingo{-}Ferrer and
                  Lloren{\c{c}} Huguet i Rotger},
  title        = {Secure network bootstrapping: An algorithm for authentic key exchange
                  and digital signitures},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {145--152},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90088-B},
  doi          = {10.1016/0167-4048(90)90088-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Domingo-FerrerR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Evans90,
  author       = {Paul Evans},
  title        = {How can professional standards be set and maintained?},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {313--316},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90100-8},
  doi          = {10.1016/0167-4048(90)90100-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Evans90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EvansM90,
  author       = {Paul Evans and
                  Tina Monk},
  title        = {Conference report: {COMPSEC} '89},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {41--44},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90154-L},
  doi          = {10.1016/0167-4048(90)90154-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EvansM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gliss90,
  author       = {Hans Gliss},
  title        = {East Germany - haven for software piracy},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {391--393},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90068-5},
  doi          = {10.1016/0167-4048(90)90068-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gliss90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarnL90,
  author       = {Lein Harn and
                  Hung{-}Yu Lin},
  title        = {A cryptographic key generation scheme for multilevel data security},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {539--546},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90132-D},
  doi          = {10.1016/0167-4048(90)90132-D},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarnL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HerschbergP90,
  author       = {I. S. Herschberg and
                  Ronald Paans},
  title        = {Friday the 13th, facts and fancies},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {125--130},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90084-7},
  doi          = {10.1016/0167-4048(90)90084-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HerschbergP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HerschbergP90a,
  author       = {I. S. Herschberg and
                  Ronald Paans},
  title        = {Sloppy, sloppier, sloppiest},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {223--228},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90167-R},
  doi          = {10.1016/0167-4048(90)90167-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HerschbergP90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {4--11},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90149-N},
  doi          = {10.1016/0167-4048(90)90149-N},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90a,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {102--109},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90081-4},
  doi          = {10.1016/0167-4048(90)90081-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90b,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {196--208},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90164-O},
  doi          = {10.1016/0167-4048(90)90164-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90c,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {282--294},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90095-B},
  doi          = {10.1016/0167-4048(90)90095-B},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90d,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {366--378},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90066-3},
  doi          = {10.1016/0167-4048(90)90066-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90e,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {470--482},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90122-A},
  doi          = {10.1016/0167-4048(90)90122-A},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90f,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {570--586},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90054-W},
  doi          = {10.1016/0167-4048(90)90054-W},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland90g,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {660--675},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90108-6},
  doi          = {10.1016/0167-4048(90)90108-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland90g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Homer90,
  author       = {Steven Homer},
  title        = {Setting standards in Europe},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {295--300},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90096-C},
  doi          = {10.1016/0167-4048(90)90096-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Homer90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Jackson90,
  author       = {Keith Jackson},
  title        = {Confessions of a security consultant},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {509--511},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90127-F},
  doi          = {10.1016/0167-4048(90)90127-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Jackson90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JonesW90,
  author       = {Scott K. Jones and
                  Clinton E. White Jr.},
  title        = {The {IPM} model of computer virus management},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {411--417},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90072-2},
  doi          = {10.1016/0167-4048(90)90072-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JonesW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Klopp90,
  author       = {Charlotte Klopp},
  title        = {Software vendors capitalize on security needs},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {33--35},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90152-J},
  doi          = {10.1016/0167-4048(90)90152-J},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Klopp90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Klopp90a,
  author       = {Charlotte Klopp},
  title        = {Microcomputer security systems attempt to lock up desktops},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {139--141},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90086-9},
  doi          = {10.1016/0167-4048(90)90086-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Klopp90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Klopp90b,
  author       = {Charlotte Klopp},
  title        = {More options for physical access control},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {229--232},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90168-S},
  doi          = {10.1016/0167-4048(90)90168-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Klopp90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Klopp90c,
  author       = {Charlotte Klopp},
  title        = {Vulnerability awareness improves contingency planning},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {309--311},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90099-F},
  doi          = {10.1016/0167-4048(90)90099-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Klopp90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Laferriere90,
  author       = {Claude Laferriere},
  title        = {A discussion of implementation strategies for secure database management
                  systems},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {235--244},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90170-X},
  doi          = {10.1016/0167-4048(90)90170-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Laferriere90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaferriereHB90,
  author       = {Claude Laferriere and
                  G. Owen Higginson and
                  Gordon G. Bell},
  title        = {Security architectures for textual databases},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {621--630},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90061-W},
  doi          = {10.1016/0167-4048(90)90061-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaferriereHB90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lathrop90,
  author       = {David L. Lathrop},
  title        = {Perestroika and its implications for computer security in the {U.S.S.R}},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {693--696},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90111-6},
  doi          = {10.1016/0167-4048(90)90111-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lathrop90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lloyd90,
  author       = {Ivor Lloyd},
  title        = {Software evaluation in high integrity systems},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {419--429},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90073-3},
  doi          = {10.1016/0167-4048(90)90073-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lloyd90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McKoskyS90,
  author       = {Robert A. McKosky and
                  Sajjan G. Shiva},
  title        = {A file integrity checking system to detect and recover from program
                  modification attacks in multi-user computer systems},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {431--446},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90074-4},
  doi          = {10.1016/0167-4048(90)90074-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McKoskyS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus90,
  author       = {Belden Menkus},
  title        = {How an "audit trail" aids in maintaining information integrity...as
                  illustrated in retailing},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {111--116},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90082-5},
  doi          = {10.1016/0167-4048(90)90082-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus90a,
  author       = {Belden Menkus},
  title        = {Understanding data communication security vulnerabilities},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {209--213},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90165-P},
  doi          = {10.1016/0167-4048(90)90165-P},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus90b,
  author       = {Belden Menkus},
  title        = {Why data communications are insecure},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {483--487},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90123-B},
  doi          = {10.1016/0167-4048(90)90123-B},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus90c,
  author       = {Belden Menkus},
  title        = {The complexity of "long haul" data communication security},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {587--592},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90055-X},
  doi          = {10.1016/0167-4048(90)90055-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mercer90,
  author       = {Lindsay C. J. Mercer},
  title        = {Tailor-made auditing of information systems for the detection of fraud},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {59--66},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90158-P},
  doi          = {10.1016/0167-4048(90)90158-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mercer90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mercer90a,
  author       = {Lindsay C. J. Mercer},
  title        = {Fraud detection via regression analysis},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {331--338},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90103-Z},
  doi          = {10.1016/0167-4048(90)90103-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mercer90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Muftic90,
  author       = {Sead Muftic},
  title        = {Transaction protection by "antennas"},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {245--255},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90171-O},
  doi          = {10.1016/0167-4048(90)90171-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Muftic90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OlsonA90,
  author       = {Ingrid M. Olson and
                  Marshall D. Abrams},
  title        = {Computer access control policy choices},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {699--714},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90113-8},
  doi          = {10.1016/0167-4048(90)90113-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OlsonA90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PaansH90,
  author       = {Ronald Paans and
                  I. S. Herschberg},
  title        = {Auditing the change management process},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {161--174},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90090-G},
  doi          = {10.1016/0167-4048(90)90090-G},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PaansH90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Parker90,
  author       = {T. A. Parker},
  title        = {Application access control standards for distributed systems},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {519--528},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90130-L},
  doi          = {10.1016/0167-4048(90)90130-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Parker90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PreneelBGV90,
  author       = {Bart Preneel and
                  Antoon Bosselaers and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Cryptanalysis of a fast cryptographic checksum algorithm},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {257--262},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90172-P},
  doi          = {10.1016/0167-4048(90)90172-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PreneelBGV90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ramaswamy90,
  author       = {Raju Ramaswamy},
  title        = {A key management algorithm for secure communication in open systems
                  interconnection architecture},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {77--84},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90160-U},
  doi          = {10.1016/0167-4048(90)90160-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ramaswamy90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchellB90,
  author       = {Roger R. Schell and
                  David Bailey},
  title        = {Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut
                  Pohl with assistance from Ludger Hutte and Ursula Weiler, {DATAKONTEXT-VERLAG}
                  Gmbh, Postfach 400253, {D-5000} Koln 40, F.R.G., {ISBN} 3-89209-000-9,
                  1989},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {459--460},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90077-7},
  doi          = {10.1016/0167-4048(90)90077-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchellB90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShepherdSP90,
  author       = {Simon J. Shepherd and
                  Peter W. Sanders and
                  A. Patel},
  title        = {A comprehensive security system - the concepts, agents and protocols},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {631--643},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90062-X},
  doi          = {10.1016/0167-4048(90)90062-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShepherdSP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sherizen90,
  author       = {Sanford Sherizen},
  title        = {Criminological concepts and research findings relevant for improving
                  computer crime control},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {215--222},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90166-Q},
  doi          = {10.1016/0167-4048(90)90166-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sherizen90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Smulders90,
  author       = {Peter Smulders},
  title        = {The threat of information theft by reception of electromagnetic radiation
                  from {RS-232} cables},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {53--58},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90157-O},
  doi          = {10.1016/0167-4048(90)90157-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Smulders90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Tabbey90,
  author       = {Kirk W. Tabbey},
  title        = {Computer crime: "Preparing the computer specific search warrant"},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {117--123},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90083-6},
  doi          = {10.1016/0167-4048(90)90083-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Tabbey90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Winters90,
  author       = {Peter Winters},
  title        = {Secure systems design - an evolving national strategy},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {379--389},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90067-4},
  doi          = {10.1016/0167-4048(90)90067-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Winters90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wiseman90,
  author       = {Simon R. Wiseman},
  title        = {Control of confidentiality in databases},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {529--537},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90131-C},
  doi          = {10.1016/0167-4048(90)90131-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wiseman90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood90,
  author       = {Charles Cresson Wood},
  title        = {Principles of secure information systems design},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {13--24},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90150-R},
  doi          = {10.1016/0167-4048(90)90150-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood90a,
  author       = {Charles Cresson Wood},
  title        = {How many information security staff people should you have?},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {395--402},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90069-6},
  doi          = {10.1016/0167-4048(90)90069-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood90b,
  author       = {Charles Creson Wood},
  title        = {Spectacular computer crimes - what they are and how they cost American
                  business half a billion dollars a year! : Buck Bloombecker, Don Jones-Irwin,
                  Homewood, IL, 1990},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {557},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90134-F},
  doi          = {10.1016/0167-4048(90)90134-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood90c,
  author       = {Charles Cresson Wood},
  title        = {Fifteen major forces driving the civilian information security market},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {677--686},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90109-7},
  doi          = {10.1016/0167-4048(90)90109-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac90,
  author       = {Bernard P. Zajac Jr.},
  title        = {Computer viruses: Can they be prevented?},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {25--31},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90151-I},
  doi          = {10.1016/0167-4048(90)90151-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac90a,
  author       = {Bernard P. Zajac Jr.},
  title        = {People: The "other" side of computer security},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {301--303},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90097-D},
  doi          = {10.1016/0167-4048(90)90097-D},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac90b,
  author       = {Bernard P. Zajac Jr.},
  title        = {The 1990s - what will they hold?},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {503--507},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90126-E},
  doi          = {10.1016/0167-4048(90)90126-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac90c,
  author       = {Bernard P. Zajac Jr.},
  title        = {Interview with Clifford Stoll},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {7},
  pages        = {601--603},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90057-Z},
  doi          = {10.1016/0167-4048(90)90057-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZviranH90,
  author       = {Moshe Zviran and
                  William J. Haga},
  title        = {Cognitive passwords: The key to easy access control},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {8},
  pages        = {723--736},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90115-A},
  doi          = {10.1016/0167-4048(90)90115-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZviranH90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZviranHM90,
  author       = {Moshe Zviran and
                  James C. Hoge and
                  Val A. Micucci},
  title        = {{SPAN} - a {DSS} for security plan analysis},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {153--160},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90089-C},
  doi          = {10.1016/0167-4048(90)90089-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZviranHM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics