default search action
Computers & Security, Volume 7
Volume 7, Number 1, February 1988
- Harold Joseph Highland:
Case history of a virus attack. 3-5 - Harold Joseph Highland:
Encryption, attacks and ethics. 5-6 - Harold Joseph Highland:
How to protect a microcomputer system. 6-7 - Harold Joseph Highland:
Chernobyl computer communications. 7-9 - Harold Joseph Highland:
Electromagnetic interference. 9-10 - Harold Joseph Highland:
IFIP/Sec '88. 10 - Harold Joseph Highland:
For your information. 10-11 - Harold Joseph Highland:
Product reviews. 13-18 - Robert H. Courtney Jr.:
Another perspective on sensitive but unclassified data. 19-23 - Harold Joseph Highland:
How secure are fiber optics communications? 25-26 - Harold Joseph Highland:
Secretdisk II - transparent automatic encryption. 27-34 - Bernard P. Zajac Jr.:
Dial-up communication lines: Can they be secured? 35-36 - Harold Joseph Highland:
Program aids for office automation security. 37-43 - Belden Menkus:
Getting started in data processing disaster recovery. 47-52 - Ellen Amsel:
Network security and access controls. 53-57 - Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Protecting statistical databases against retrieval of private information. 59-63 - Per Christoffersson:
Message authentication and encryption combined. 65-71 - Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. 73-82 - Arto Salomaa:
A public-key cryptosystem based on language theory. 83-87 - Abstracts of recent articles and literature. Comput. Secur. 7(1): 101-110 (1988)
Volume 7, Number 2, April 1988
- Harold Joseph Highland:
From the editor. 114 - William A. J. Bound:
Discussing security with top management. 129-130 - Bernard P. Zajac Jr.:
Personnel: The other half of data security. 131-132 - Belden Menkus:
Understanding the use of passwords. 132-136 - G. J. Bologna:
Pitfalls in measuring MIS performance. 137-138 - William Hugh Murray:
The application of epidemiology to computer viruses. 139-145 - Harold Joseph Highland:
Anatomy of a virus attack. 145-150 - Viiveke Fåk:
Are we vulnerable to a virus attack? A report from Sweden. 151-155 - Harold Joseph Highland:
An overview of 18 virus protection products. 157-161 - Harold Joseph Highland:
How to combat a computer virus. 157 - Fred Cohen:
On the implications of computer viruses and methods of defense. 167-184 - Detmar W. Straub Jr.:
Organizational structuring of the computer security function. 185-195 - I. S. Herschberg:
Make the tigers hunt for you. 197-203 - Abstracts of recent articles and literature. Comput. Secur. 7(2): 213-223 (1988)
Volume 7, Number 3, June 1988
- Harold Joseph Highland:
From the editor. 228 - Harold Joseph Highland:
Open Sesame-Hackers welcome. 232-233 - Harold Joseph Highland:
Security director's dilemma. 233-235 - Harold Joseph Highland:
How to test a virus filter without a virus. 235-237 - Harold Joseph Highland:
Virus disaster red book. 237 - Harold Joseph Highland:
Blitzed by a computer virus. 237-239 - Harold Joseph Highland:
Special virus protection measures. 239-242 - Harold Joseph Highland:
Upcoming conferences of note. 242-243 - Harold Joseph Highland:
Star wars security or where did those micros go? 243-244 - Jack Bologna:
Managing an information system crisis. 245-247 - Bernard P. Zajac Jr.:
Distributed data processing: New problems. 249-250 - G. Will Milor:
The computer security act of 1987. 251-253 - Jon David:
Treating viral fever. 255-258 - Belden Menkus:
Breakpoints. 261-268 - Margaret E. van Biene-Hershey:
The technical EDP-audit function. 271-277 - Fred Cohen:
Designing provably correct information networks with digital diodes. 279-286 - G. M. J. Pluimakers:
Some notes on authorization and transaction management in distributed database systems. 287-298 - Dirk Van der Bank, Edwin Anderssen:
Cryptographic figures of merit. 299-303 - Harold Joseph Highland:
Report on the fourth national computer security conference: COMPSEC IV. 309-311 - Ronald Paans:
The second European conference on computer audit, control and security. 312-315 - Abstracts of recent articles and literature. Comput. Secur. 7(3): 320-331 (1988)
Volume 7, Number 4, August 1988
- Harold Joseph Highland:
From the editor. 334
- Frederick Cohen:
Ethical issues in computer virus distribution. 335-336
- Harold Joseph Highland:
How to obtain a computer virus. 337 - Harold Joseph Highland:
Are virus attack statistics reliable? 338 - Harold Joseph Highland:
Hackers revisited. 339 - Harold Joseph Highland:
New video terminal law. 340 - Harold Joseph Highland:
Electromagnetic eavesdropping machines for christmas? 341 - Harold Joseph Highland:
Tips on terrorism. 344 - Harold Joseph Highland:
Investigating a reported virus attack. 344-345 - Harold Joseph Highland:
Virus filter update. 345 - C. Wayne Madsen:
The world meganetwork and terrorism. 347-352 - Jack Bologna:
Selection risks in hiring information systems personnel. 353-355 - Harold Joseph Highland:
The anatomy of a DOS Disk. 357-360 - Belden Menkus:
U.S. Government agencies belatedly address information system security issues. 361-366 - Harold Joseph Highland:
The brain virus: Fact and fantasy. 367-370 - Rita C. Summers, Stanley A. Kurzban:
Potential applications of knowledge-based methods to computer security. 373-385 - John McHugh, Bhavani M. Thuraisingham:
Multilevel security issues in distributed database management systems. 387-396 - Ian H. Witten, John G. Cleary:
On the privacy afforded by adaptive text compression. 397-408 - Fred Cohen, Stephen Bruhns:
Two secure file servers. 409-414 - Abstracts of recent articles and literature. Comput. Secur. 7(4): 423-434 (1988)
Volume 7, Number 5, October 1988
- Harold Joseph Highland:
From the editor. 438 - Harold Joseph Highland:
U.S. Congress computer virus report. 439 - Harold Joseph Highland:
Write-protect tab warning. 439 - Harold Joseph Highland:
Virus filter evaluation. 440 - Harold Joseph Highland:
Virus filter update. 441-442 - Harold Joseph Highland:
Computer viruses: Media hyperbole, errors and ignorance. 442-450 - Raymond M. Glath:
The case of the "Gerbil virus" that wasn't. 451-453 - Charles Cresson Wood:
A context for information systems security planning. 455-465 - James A. Schweitzer:
Security news briefs. 467-469 - Bernard P. Zajac Jr.:
Viruses: Should we quit talking about them? 471-472 - John M. Carroll, Robert B. Mowat, Lynda E. Robbins, David Wiseman:
The password predictor - a training aid for raising security awareness. 475-481 - Chris J. Mitchell, Michael Walker:
Solutions to the multidestination secure electronic mail problem. 483-488 - Fred Cohen:
Maintaining a poor person's information integrity. 489-494 - Charles P. Pfleeger, Shari Lawrence Pfleeger:
A transaction flow approach to software security certification for document handling systems. 495-502 - Yue Jiang Huang, Fred Cohen:
Some weak points of one fast cryptographic checksum algorithm and its improvement. 503-505 - Abstracts of recent articles and literature. Comput. Secur. 7(5): 509-520 (1988)
- Abstracts of recent articles and literature. Comput. Secur. 7(5): 521-529 (1988)
Volume 7, Number 6, December 1988
- Harold Joseph Highland:
From the editor. 532 - Harold Joseph Highland:
Random bits & bytes. 533-541 - Cliff Stoll:
How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers. 543-547 - Belden Menkus:
Understanding password compromise. 549-552 - Jack Bologna:
Soviet white-collar crime and criminal justice. 553-556 - Jan H. P. Eloff:
Computer security policy: Important issues. 559-562 - John M. Carroll:
Implementing multilevel security by violation privilege. 563-573 - Joachim Biskup, Hans Hermann Brüggemann:
The personal model of data: Towards a privacy-oriented information system. 575-597 - Ravinderpal Singh Sandhu:
Nested categories for access control. 599-605 - Abstracts of recent articles and literature. 609-615
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.