default search action
Computers & Security, Volume 16
Volume 16, Number 1, 1997
- John Meyer:
From the editor. 2-3 - Harold Joseph Highland:
Random bits & bytes & bytes. 4-13 - Gerald L. Kovacich:
Information warfare and the information systems security professional. 14-24 - Brian Boyce:
Cyber extortion - The corporate response. 25-28 - Fred Cohen:
Information system attacks: A preliminary classification scheme. 29-46 - Harold Joseph Highland:
Current literature The 19th National Information Systems Security Conference. 47-59 - Ben Soh, Tharam S. Dillon:
System intrusion processes: a simulation model. 71-79
Volume 16, Number 2, 1997
- Fred Cohen:
Information system defences: A preliminary classification scheme. 94-114 - Stephane G. Bouniol:
The puzzle theorem - The less I know, the less I can disclose ... 115-125 - Dennis M. Volpano, Cynthia E. Irvine:
Secure flow typing. 137-144 - O. Tettero, D. J. Out, Henry M. Franken, J. Schot:
Information security embedded in the design of telematics systems. 145-164
Volume 16, Number 3, 1997
- James E. Molini:
Electronic borders: Defining and protecting national networks. 189-196 - Thomas Finne:
What are the information security risks in decision support systems and data warehousing? 197-204 - Harold Joseph Highland:
IFIP/SEC'97 conference proceedings. 205 - Zbigniew Ciechanowicz:
Risk analysis: requirements, conflicts and problems. 223-232 - Ivan Krsul, Eugene H. Spafford:
Authorship analysis: identifying the author of a program. 233-257
Volume 16, Number 4, 1997
- Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 16(4): 266-275 (1997) - Tom Mulhall:
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. 277-284 - Tom Mulhall:
Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem. 285-290 - Tom Mulhall:
Where have all the hackers gone?: Part 3 - Motivation and deterrence. 291-297 - Tom Mulhall:
Where have all the hackers gone?: Part 4 - Legislation. 298-303 - Tom Mulhall:
Where have all the hackers gone?: Part 5 - Conclusions. 304-306 - Tom Mulhall:
Where have all the hackers gone?: Part 6 - Appendices and bibliography. 307-315 - Charles Cresson Wood:
A management view of internet electronic commerce security. 316-320 - Gerald L. Kovacich:
The ISSO must understand the business and management environment. 321-326 - Chih-Hung Wang, Tzonelih Hwang:
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication. 339-344
Volume 16, Number 5, 1997
- John Meyer:
Professor Harold Joseph Highland FICS, FACM. 350-355 - Random bits & bytes. 356-364
- Harold Joseph Highland:
The threats on the web. 365-368 - Harold Joseph Highland:
Data encryption: A non-mathematical approach. 369-386 - Harold Joseph Highland:
Historical bits & bytes. 387-411 - Harold Joseph Highland:
A history of computer viruses - Introduction. 412-415 - Harold Joseph Highland:
A history of computer viruses - The famous 'trio'. 416-429 - Harold Joseph Highland:
A history of computer viruses: Three special viruses. 430-438 - Harold Joseph Highland:
Procedures to reduce the computer virus threat. 439-449
Volume 16, Number 6, 1997
- From the editor. 452-453
- Gerald L. Kovacich:
ISSO career development. 455-458 - Thomas Finne:
Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain. 469-479 - Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic:
Two-phase cryptographic key recovery system. 481-506 - Les Labuschagne, Jan H. P. Eloff:
Improved system-access control using complementary technologies. 543-549 - Simon N. Foley:
Building Chinese walls in standard unixTM. 551-563
Volume 16, Number 7, 1997
- From the editor. 570-571
- Donn B. Parker:
The strategic values of information security in business. 572-582 - Nigel Hickson:
Encryption policy - A UK perspective. 583-589 - Chris Pounder:
First steps towards a european union policy on the securing of electronic communications. 590-594 - Andy Jones:
Penetration testing and system audit - experience gained during the investigation of systems within the UK. 595-602 - John Sherwood:
Managing security for outsourcing contracts. 603-609 - Gerald L. Kovacich:
Information systems security metrics management. 610-618 - Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat:
Cognitive, associative and conventional passwords: Recall and guessing rates. 629-641
Volume 16, Number 8, 1997
- From the editor. 648-649
- Pauline Ratnasingham:
EDI security - re-evaluation of controls and its implications on the organizations. 650-656 - Gerald L. Kovacich:
How to market yourself as an ISSO. 657-662 - Alasdair Kemp:
Embedded systems: The other problem. 663-668 - Andrew J. Clark:
Key recovery - why, how, who?. 669-674 - Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
Protecting databases from inference attacks. 687-708 - Dimitris Gritzalis:
A baseline security policy for distributed healthcare information systems. 709-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.