default search action
Computers & Security, Volume 10
Volume 10, Number 1, February 1991
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(1): 4-16 (1991) - Bernard Robertson:
Electronic mail - Is is safe to use? 17-19 - Bill Farquhar:
One approach to risk assessment. 21-23 - Kazue Tanaka, Eiji Okamoto:
Key distribution system for mail systems using ID-related information directory. 25-33 - Chris J. Mitchell, Vijay Varadharajan:
Modified forms of cipher block chaining. 37-40 - Claude Laferriere:
Predicate based polyinstantiation in multi-level secure DBMS. 41-49 - Vijay Varadharajan, Stewart Black:
Multilevel security in a distributed object-oriented system. 51-68 - J. Carr:
Electronic data interchange - security risk or not? 69-72
Volume 10, Number 2, April 1991
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(2): 92-100 (1991) - Karl Rihaczek:
The harmonized ITSEC evaluation criteria. 101-110 - Harold W. Thimbleby:
Can viruses ever be useful? 111-114 - Jim Press:
Secure transfer of identity and privilege attributes in an open systems environment. 117-127 - Jinn-Ke Jan, Chin-Chen Chang, S. J. Wang:
A dynamic key-lock-pair access control scheme. 129-139 - Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou:
Data security in medical information systems: The Greek case. 141-159
Volume 10, Number 3, May 1991
- Harold Joseph Highland:
A non-mathematical view of encryption. Comput. Secur. 10(3): 184-188 (1991) - Harold Joseph Highland:
Evaluating an encryption package. Comput. Secur. 10(3): 189-190 (1991) - Harold Joseph Highland:
Computers under attack. Comput. Secur. 10(3): 190-191 (1991) - Harold Joseph Highland:
Microcomputer utilities. Comput. Secur. 10(3): 191-195 (1991) - Harold Joseph Highland:
NTIS volumes of interest. Comput. Secur. 10(3): 195-198 (1991) - Belden Menkus:
How to begin dealing with computer security. 199-203 - Simon Banks:
Understanding IBM's CICS systems to improve security. 205-212 - Stewart Kowalski:
The ABCs and Es of national computer security policies. 213-216 - Stewart Kowalski:
Cybernetic analysis of national computer security. 217-227 - Stewart Kowalski:
Cybernetic analysis of the 12th U.S. National Computer Security Conference. 228-235 - Frederick B. Cohen:
A cost analysis of typical computer viruses and defenses. 239-250 - Ronald Paans, Hans de Lange:
Auditing the SNA/SNI environment. 251-261 - Denis Laurichesse, Laurent Blain:
Optimized implementation of RSA cryptosystem. 263-267 - R. J. Allen:
Trusted ORACLE - multilevel secure data management for military computing. 271-275
Volume 10, Number 4, June 1991
- Belden Menkus:
"Control" is fundamental to successful information security. 293-297 - Andrew Hiles:
Computer fire risks. 299-302 - Jack Bologna:
A framework for the ethical analysis of information technologies. 303-307 - Ronald Paans:
With MVS/ESA security labels towards B1. 309-324 - Paul Evans:
Computer fraud - The situation, detection and training. 325-327 - Gerald V. Post, Karen-Ann Kievit:
Accessibility vs. security: A look at the demand for computer security. 331-344 - Avi Rushinek, Sara F. Rushinek:
Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security. 345-357 - Christof Schramm:
Computing centers undermine MVS security. 359-370
Volume 10, Number 5, August 1991
- Harold Joseph Highland:
Random bits & bytes. 384-397 - Charles Cresson Wood:
Using information security to achieve competitive advantage. 399-404 - Belden Menkus:
"Hackers": Know the adversary. 405-409 - Ravi S. Sandhu, Sushil Jajodia:
Integrity principles and mechanisms in database management systems. 413-427 - Jan Kruys:
Progress in secure distributed systems. 429-441 - G. F. G. O'Shea:
Operating system integrity. 443-465
Volume 10, Number 6, October 1991
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(6): 486-495 (1991) - Paul Herbert Rosenthal, Barry Himel:
Business resumption planning: Exercising your emergency response teams. 497-514 - Shari Lawrence Pfleeger:
A framework for security requirements. 515-523 - Charles Cresson Wood:
Burning computer security, privacy, and freedom issues. 524-532 - Frederick B. Cohen:
A note on high-integrity PC bootstrapping. 535-539 - Frederick B. Cohen:
A DOS-based POset implementation. 541-551 - Hannu Nurmi, Arto Salomaa, Lila Santean:
Secret ballot elections in computer networks. 553-560 - S. Peach:
Disaster recovery: An unnecessary cost burden or an essential feature of any DP installation? 565-568
Volume 10, Number 7, November 1991
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(7): 586-600 (1991) - Sanford Sherizen:
European unification '92 impacts on information security. 601-610 - Gerhard Steinke:
Design aspects of access control in a knowledge base system. 612-625 - Viiveke Fåk:
Computer verification of human users' identity: A theoretical model and some evaluation criteria. 626-636 - Josep Domingo-Ferrer:
Algorithm- sequenced access control. 639-652 - Dalenca Pottas, Sebastiaan H. von Solms:
A computerized management reporting aid for a mainframe security system. 653-660 - M. L. Goyal, G. V. Singh:
Access control in distributed heterogeneous database management systems. 661-669
Volume 10, Number 8, December 1991
- Harold Joseph Highland:
Random bits & bytes. 690-699 - Charles Preston:
Creating a corporate virus plan. 701-710 - Paul Lynch:
Beyond RACF: Extending user authentication controls. 711-722 - Bhavani Thuraisingham:
Multilevel security issues in distributed database management systems II. 727-747 - Richard L. Baskerville:
Risk analysis as a source of professional knowledge. 749-764 - Gnanesh Coomaraswamy, Srikanta P. R. Kumar, Michel E. Marhic:
Fiber-optic LAN/WAN systems to support confidential communication. 765-776
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.