default search action
Computers & Security, Volume 15
Volume 14, Number 1, 1995
- Harold Joseph Highland:
Random bits & bytes. 4-13 - Martin Smith, John Sherwood:
Business continuity planning. 14-23 - Marshall D. Abrams, Michael V. Joyce:
Trusted system concepts. 45-56 - Marshall D. Abrams, Michael V. Joyce:
Trusted computing update. 57-68 - Marshall D. Abrams, Michael V. Joyce:
New thinking about information technology security. 69-81
Volume 14, Number 2, 1995
- Harold Joseph Highland:
Random Bits & Bytes. 90-102 - Manfred Möhrenschlager:
Hacking: To criminalize or not ? - suggestions for the legislature. 103-112 - Henry B. Wolfe:
Computer security: For fun and profit. 113-115 - Tzong-Chen Wu, Wei-Hua He:
A geometric approach for sharing secrets. 135-145 - Marshall D. Abrams, Jonathan D. Moffett:
A higher level of computer security through active policies. 147-157 - Hui-Min Tsai, Chin-Chen Chang:
A cryptographic implementation for dynamic access control in a user hierarchy. 159-166 - John G. Cleary, Sean A. Irvine, Ingrid Rinsma-Melchert:
On the insecurity of arithmetic coding. 167-180
Volume 14, Number 3, 1995
- Harold Joseph Highland:
Random bits & bytes. 188-196 - Edwin B. Heinlein:
Principles of information systems security. 197-198 - Scott Hill, Martin Smith:
Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace. 199-204 - Hyun-jung Kim:
Biometrics, is it a viable proposition for identity authentication and access control? 205-214 - Frank Deane, Kate Barrelle, Ron Henderson, Doug Mahar:
Perceived acceptability of biometric security systems. 225-231 - Matt Bishop, Daniel V. Klein:
Improving system security via proactive password checking. 233-249 - H. A. S. Booysen, Jan H. P. Eloff:
Classification of objects for improved access control. 251-265
Volume 14, Number 4, 1995
- Harold Joseph Highland:
Random bits & bytes. 274-282 - Charles Cresson Wood:
Shifting information systems security responsibility from user organizations to vendor/publisher organizations. 283-284 - Charles Cresson Wood, Karen Snow:
ISO 9000 and information security. 287-288 - Gerald L. Kovacich:
Recovering computer-generated evidence. 289-296 - Simon R. Wiseman:
Classification services in the SWORD secure DBMS. 307-321 - Greg O'Shea:
Redundant access rights. 323-348 - Simon J. Shepherd:
A high speed software implementation of the Data Encryption Standard. 349-357
Volume 14, Number 5, 1995
- Harold Joseph Highland:
Random bits & bytes. 365-371 - Jean Hitchings:
Deficiencies of the traditional approach to information security and the requirements for a new methodology. 377-383 - John Leach:
Dynamic authentication for smartcards. 385-389 - Sarah Gordon:
Technologically enabled crime: Shifting paradigms for the Year 2000. 391-402 - Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses. 435-448 - Muninder P. Kailay, Peter Jarratt:
RAMeX: a prototype expert system for computer security risk analysis and management. 449-463 - Thomas Hardjono, Jennifer Seberry:
Applications of smartcards for anonymous and verifiable databases. 465-472
Volume 14, Number 6, 1995
- Harold Joseph Highland:
Random bits & bytes. 480-488 - Claude Oliver:
Privacy, anonymity and accountability. 489-490 - Alan R. Krull:
Controls in the next millennium: Anticipating the IT-enabled future. 491-495 - Jim Reid:
Open systems security: Traps and pitfalls. 496-517 - Frank Stoll:
The need for decentralization and privacy in mobile communications networks. 527-539 - Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson:
MCF: a malicious code filter. 541-566
Volume 14, Number 7, 1995
- Harold Joseph Highland:
Random bits & bytes. 574-585 - Christopher L. J. Holloway:
Controlling the use of cryptographic keys. 587-598 - Sarah Gordon:
Internet 101. 599-604 - Ben Soh, Tharam S. Dillon:
Setting optimal intrusion-detection thresholds. 621-631 - Fred de Koning:
A methodology for the design of security plans. 633-643 - James Backhouse, Gurpreet Dhillon:
Managing computer crime: a research outlook. 645-651
Volume 14, Number 8, 1995
- Harold Joseph Highland:
Random bits & bytes. 660-666 - Charles Cresson Wood:
Writing infosec policies. 667-674 - Rebecca J. Duncan:
There are some cracks in the cornerstone of information security. 675-680 - Christopher L. J. Holloway:
Controlling digital signature services using a smartcard. 681-690 - Kenneth R. Lindup:
A new model for information security policies. 691-695 - Love Ekenberg, Subhash Oberoi, István Orci:
A cost model for managing information security hazards. 707-717 - Marshall D. Abrams, Marvin V. Zelkowitz:
Striving for correctness. 719-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.