default search action
Computers & Security, Volume 12
Volume 12, Number 1, February 1993
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(1): 4-14 (1993) - L. G. Lawrence:
The role of roles. 15-21 - Joseph M. Pujals:
Security and privacy. 22-27 - Steve Donovan:
Security of PCs in a distributed environment. 28-31 - Charles Cresson Wood, William W. Banks Jr.:
Human error: an overlooked but significant information security problem. 51-60 - Thomas A. Longstaff, E. Eugene Schultz:
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. 61-77 - Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger:
A survey of security issues in office computation and the application of secure computing models to office systems. 79-97
Volume 12, Number 2, March 1993
- Harold Joseph Highland:
Random bits & bytes. 106-116 - Stanley H. Stahl:
Information security in workstation environments. 117-122 - Robert A. Clyde:
DECnet security (Not necessarily an oxymoron). 123-127 - David Moseley:
Public key management for X.25 network security. 128-133 - Helen A. Bergen, James M. Hogan:
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. 157-167 - John A. Fitch III, Lance J. Hoffman:
A shortest path network security model. 169-189 - Mary C. Jones, Kirk P. Arnett, Jeung-tai Eddie Tang, Nian-Shin Chen:
Perceptions of computer viruses: a cross-cultural assessment. 191-197
Volume 12, Number 3, May 1993
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(3): 216-224 (1993) - Geoff Norman:
Disaster recovery after downsizing. 225-229 - L. G. Lawrence:
Digital signatures - Explanation and usage. 230-233 - Judith Hochberg, Kathleen A. Jackson, Cathy A. Stallings, J. F. McClary, David H. DuBois, Josephine Ford:
NADIR: An automated system for detecting network intrusion and misuse. 235-248 - Harold Joseph Highland:
Conference report. 249-253 - Jeffrey M. Voas, Jeffery E. Payne, Frederick B. Cohen:
A model for detecting the existence of software corruption in real time. 275-283 - Ravi S. Sandhu, Gurpreet S. Suri:
A distributed capability-based architecture for the transform model. 285-303 - P. Venkat Rangan:
The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol. 305-314
Volume 12, Number 4, June 1993
- Edwin B. Heinlein:
Recovery management. Comput. Secur. 12(4): 334-337 (1993) - John Meyer:
The 1993 IFIP Kristian Beckman Award. Comput. Secur. 12(4): 338-340 (1993) - Manfred Reitenspieß:
Open system security standards. Comput. Secur. 12(4): 341-361 (1993) - Christof Schramm:
Added-on security for MVS: weaknesses and measures. 379-388 - James M. Slack, Elizabeth A. Unger:
Integrity in object-oriented database systems. 389-404 - Teresa F. Lunt:
A survey of intrusion detection techniques. 405-418
Volume 12, Number 5, August 1993
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(5): 424-433 (1993) - Edwin B. Heinlein:
World Trade Center - A retrospective. 435-436 - David K. Black:
The Digital Signature Standard: Overview and current status. 437-446 - Barbara B. Di Turi:
Security for EDIFACT messages. 447-455 - Frans Labuschagne, Jan Roos:
Data security in X.25 networks. 469-475 - Andreas Pfitzmann, Ralf Aßmann:
More efficient software implementations of (generalized) DES. 477-500 - J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda:
Encryption and error correction codes for reliable file storage. 501-510
Volume 12, Number 6, October 1993
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(6): 518-526 (1993) - Charles Cresson Wood:
Duress terminations and information security. 527-535 - Michael F. Kensey:
Computer viruses - Towards better solutions. 536-541 - Selwyn Russell:
Paradigms for verification of authorization at source of electronic documents in an integrated environment. 542-549 - Harold Joseph Highland:
IFIP/Sec '93 conference report. 550-555 - Frederick B. Cohen:
Operating system protection through program evolution. 565-584 - Eugene H. Spafford, Stephen A. Weeber:
Software forensics: Can we track code to its authors? 585-595 - Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst:
A comparative framework for risk analysis methods. 597-603
Volume 12, Number 7, November 1993
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(7): 612-622 (1993) - Martin Plant:
Getting management buy-in to IT security. 623-626 - Edwin B. Heinlein:
I worked with Murphy. 627-628 - Brian S. Collins, Steve Mathews:
Securing your business process. 629-633 - Harold Joseph Highland:
A view of information security tomorrow. 634-639 - William J. Caelli, Ian G. Graham, Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs). 640-645 - Mohammad S. Obaidat:
A methodology for improving computer access security. 657-662 - Charles Cresson Wood:
Principles of secure information systems design with groupware examples. 663-678 - Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams:
Report of an integrity research study group. 679-689
Volume 12, Number 8, December 1993
- Harold Joseph Highland:
Random bits & bytes. 698-709 - Peter Fagan:
Organizational issues in IT security. 710-715 - Gary Hardy:
Commercial accreditation of information security. 716-729 - Harold Joseph Highland:
16th national computer security conference. 730-734 - Dieter Gollmann, Thomas Beth, Frank Damm:
Authentication services in distributed systems. 753-764 - Jon Ølnes:
EDIFACT security made simple - the EDIMED approach. 765-774 - Frank Koerner:
System threats and vulnerabilities and the contrary principle. 775-779 - Caroline Allinson, Helen Bergen, Ed Dawson:
Message collision in block ciphers with message authentication. 781-787
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.