default search action
Computers & Security, Volume 4
Volume 4, Number 1, March 1985
- Harold Joseph Highland:
Editorial. 1-2 - John M. Carroll, W. R. Mac Iver:
COSSAC: a framework for analyzing and configuring secure computer facilities. 5-12 - James A. Schweitzer:
A management view: computer security as a discretionary decision. 13-22 - Graham Gal, William E. McCarthy:
Specification of internal accounting controls in a database environment. 23-32 - Michael J. Cerullo:
General controls in computer systems. 33-45 - Stephen C. Serpell:
Cryptographic equipment security: a code of practice. 47-64 - Harold Joseph Highland:
The first national computer security conference. 65-73
Volume 4, Number 2, June 1985
- Harold Joseph Highland:
Editorial. 101-102 - Isaac L. Auerbach:
Professional responsibility for information privacy. 103-107 - Gee Kin Yeo:
Incorporating access control in forms systems. 109-122 - Harold Joseph Highland:
Microcomputer security: Data protection techniques. 123-134 - Belden Menkus:
The EDP auditor's role in computer security. 135-138 - James E. Miller:
Transaction controls: Steps to take after the equipment has been secured. 139-141 - Jan H. P. Eloff:
The development of a specification language for a computer security system. 143-147 - Per L. Hoving, Johan Essén:
Minutes from the first meeting of TC 11, security and protection in information processing systems. 149-152
Volume 4, Number 3, September 1985
- Harold Joseph Highland:
Editorial : Office automation or on the value of being a dinosaur. 185-186 - Fred Cohen:
A secure computer network design. 189-205 - Jean-Pierre Chamoux:
Data security and confidentiality in Europe. 207-210 - Józef P. Pieprzyk, Dominik Rutkowski:
Modular design of information encipherment for computer systems. 211-218 - Belden Menkus:
The impact of the Bell system breakup on DP disaster recovery planning. 219-222 - Charles Cresson Wood:
Floppy diskette security measures. 223-228 - Harold Joseph Highland:
U.S. computer crime legislation highlighted in special report. 245-246
- Harold Joseph Highland:
Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95. 247 - Harold Joseph Highland:
Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95. 247-248 - Charles Cresson Wood:
Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50. 248-249 - Harold Joseph Highland:
Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25. 249 - Esther Harris Highland:
Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ US $28.75. 249 - Esther Harris Highland:
Proceedings of the seventh computer security group conference : Washington: US government printing office, 1984 - 776-101/1027. 115 pages. 249-250
Volume 4, Number 4, December 1985
- Harold Joseph Highland:
Editorial. 267-268 - Wim van Eck:
Electromagnetic radiation from video display units: An eavesdropping risk? 269-286 - Ken Wong:
Computer crime - Risk management and computer security. 287-295 - Józef P. Pieprzyk, Dominik Rutkowski:
Design of public key cryptosystems using idempotent elements. 297-308 - Pieter de Bruyne:
Signature verification using holistic measures. 309-315 - A. J. du Croix:
Data sharing and access protection in business system 12. 317-323 - Victor L. Voydock, Stephen T. Kent:
Security mechanisms in a transport layer protocol. 325-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.