default search action
Computers & Security, Volume 11
Volume 11, Number 1, March 1992
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(1): 4-15 (1992) - Belden Menkus:
A high rise building fire case study. 19-23 - Robin L. Sherman:
Distributed systems security. 24-28 - Bernard P. Zajac Jr.:
Computer viral risks - how bad is the threat? 29-34 - Teresa F. Lunt:
Security in database systems: A research perspective. 41-56 - Atika Laribi, Dennis G. Kafura:
A protection model incorporating both authorization and constraints. 57-73 - Dennis Longley, S. Rigby:
An automatic search for security flaws in key management schemes. 75-89
Volume 11, Number 2, April 1992
- Harold Joseph Highland:
Random bits & bytes. 110-120 - Belden Menkus:
Introduction to computer security. 121-127 - Robin L. Sherman:
Biometrics futures. 128-133 - Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras:
Determining access rights for medical information systems. 149-161 - P. Venkat Rangan:
An axiomatic theory of trust in secure communication protocols. 163-172 - Rotraut Laun:
Asymmetric user authentication. 173-183
Volume 11, Number 3, May 1992
- Harold Joseph Highland:
Random bits & bytes. 200-209 - Belden Menkus:
Concerns in computer security. 211-215 - Bernard P. Zajac Jr.:
Cost-effectiveness of anti-viral software. 217-226 - Harold Joseph Highland:
The security impact of networks, telecommunications, and office automation. 227-232 - Wayne Madsen:
Government-sponsored computer warfare and sabotage. 233-236 - Ian G. Graham, St. H. Wieten:
The PC as a secure network workstation. 237-244 - George I. Davida, Yvo Desmedt:
Passports and visas versus IDs. 253-258 - Martin S. Olivier, Sebastiaan H. von Solms:
Building a secure database using self-protecting objects. 259-271 - Eugene H. Spafford:
OPUS: Preventing weak password choices. 273-278
Volume 11, Number 4, July 1992
- Harold Joseph Highland:
Random bits & bytes. 294-306 - Rob Dixon, Claire Marston, Paul A. Collier:
A report on the joint CIMA and IIA computer fraud survey. 307-313 - T. P. de Vries:
The implementation of TSS. 315-325 - Information security administration model: A management model to help identify the best practices of the administration function within the security group. 327-340
- Gunar E. Liepins, H. S. Vaccaro:
Intrusion detection: Its role and validation. 347-355 - Jie Wu, Eduardo B. Fernández, Ruiguang Zhang:
Some extensions to the lattice model for computer security. 357-369
Volume 11, Number 5, September 1992
- Harold Joseph Highland:
Random bits & bytes. 390-406 - L. G. Lawrence:
RACIF security goals comment on a paper by R. Paans. 407-411 - Geoff Norman:
PC security issues. 412-416 - Belden Menkus:
The lessons of the Great Chicago flood of 1992. 417-420 - David L. Lathrop:
Security aspects of wireless local area networks. 421-426 - Fritz Bauspieß, Frank Damm:
Requirements for cryptographic hash functions. 427-437 - Helen A. Bergen, James M. Hogan:
Data security in a fixed-model arithmetic coding compression algorithm. 445-461 - William J. Caelli, Anthony W. Rhodes, Nick C. Russell:
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. 463-479
Volume 11, Number 6, October 1992
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(6): 498-507 (1992) - Françoise Gilbert:
Breach of system security and theft of data: Legal aspects and preventive measures. 508-517 - John Robinson:
Computer security evaluation: Developments in the European ITSEC programme. 518-524 - Belden Menkus:
Understanding EDI security issues. 525-528 - Ravi S. Sandhu, Sushil Jajodia:
Eliminating polyinstantiation securely. 547-562 - Frederick B. Cohen:
Defense-in-depth against computer viruses. 563-579 - Sebastiaan H. von Solms, David Naccache:
On blind signatures and perfect crimes. 581-583
Volume 11, Number 7, November 1992
- Harold Joseph Highland:
Random bits & bytes. 592-601 - Alan Solomon:
The virus authors strike back. 602-606 - Jon David:
LAN security standards. 607-619 - Michael J. Cerullo, R. Steve McDuffie:
Computer contingency plans and the auditors: A survey of businesses affected by Hurricane Hugo. 620-622 - Frederick B. Cohen:
A formal definition of computer worms and some related results. 641-652 - Sead Muftic, Edina Hatunic:
CISS: Generalized security libraries. 653-659 - Bhavani Thuraisingham, Harvey H. Rubinovitz:
Multilevel security issues in distributed database management systems - III. 661-674
Volume 11, Number 8, December 1992
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(8): 682-694 (1992) - Todd Whiting:
Understanding VAX/VMS security. Comput. Secur. 11(8): 695-698 (1992) - George Black:
Update on open systems security. Comput. Secur. 11(8): 699-702 (1992) - Belden Menkus:
Re-examining the Data Encryption Standard. Comput. Secur. 11(8): 703-706 (1992) - Judith King:
X.400 security. Comput. Secur. 11(8): 707-710 (1992) - Gary Hardy:
Case study: Closing 'windows' against intruders. Comput. Secur. 11(8): 711-714 (1992) - Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis:
A zero knowledge probabilistic login protocol. 733-745 - Lein Harn, Hung-Yu Lin, Shoubao Yang:
A software authentication system for information integrity. 747-752 - Ravi S. Sandhu:
Lattice-based enforcement of Chinese Walls. 753-763
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.