


default search action
Computers & Security, Volume 8
Volume 8, Number 1, February 1989
- Harold Joseph Highland:
From the editor. 2 - Harold Joseph Highland:
Random bits & bytes. 3-13 - Rolf Moulton, Robert P. Bigelow:
Protecting ownership of proprietary information. 15-21 - Lance J. Hoffman:
Risk analysis and computer security: Towards a theory at last. 23-24 - Bernard P. Zajac Jr.:
Legal options to computer viruses. 25-27 - Jack Bologna:
The one minute fraud auditor. 29-31 - Winfried Gleissner:
A mathematical theory for the spread of computer viruses. 35-41 - Teresa F. Lunt:
Access control policies: Some unanswered questions. 43-54 - Chris J. Mitchell
, Dave Rush, Michael Walker:
A remark on hash functions for message authentication. 55-58 - J. Feuerlicht, P. Grattan:
The role of classification of information in controlling data proliferation in end-user personal computer environment. 59-66 - Esther H. Highland:
Abstracts of recent articles and literature. 74-82
Volume 8, Number 2, April 1989
- Harold Joseph Highland:
From the editor. 86 - Harold Joseph Highland:
Random bits & bytes. 91-100 - Harold Joseph Highland:
Reports from the victims. 101 - Anne E. Webster:
University of Delaware and the Pakistani computer virus. 103-105 - Kenneth R. van Wyk:
The Lehigh virus. 107-110 - Yisrael Radai:
The Israeli PC virus. 111-113 - Belden Menkus:
The computer virus situation is not encouraging. 115-119 - Ron Weber:
Controls in electronic funds transfer systems: A survey and synthesis. 123-137 - Jan P. Kruys:
Security of open systems. 139-147 - Fred Cohen:
Models of practical defenses against computer viruses. 149-160 - Esther H. Highland:
Abstracts of recent articles and literature. 163-172
Volume 8, Number 3, May 1989
- Harold Joseph Highland:
From the editor. 176-177 - Harold Joseph Highland:
Random bits & bytes. 178-188 - Charles Cresson Wood:
Planning: A means to achieve data communications security. 189-199 - Belden Menkus:
Physical security: Selecting an access control system. 201-205 - M. Shain:
Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services' global network. 209-221 - Thomas P. Keenan
:
Emerging vulnerabilities in office automation security. 223-227 - D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:
Prototyping to explore MLS/DBMS design. 229-245 - Ken J. Fifield:
Smartcards outsmart computer crime. 247-255 - Esther H. Highland:
Abstracts of recent articles and literature. 259-269
Volume 8, Number 4, June 1989
- Harold Joseph Highland:
From the editor. 272-273 - Harold Joseph Highland:
Random bits & bytes. 274-282 - Rodger Jamieson, Graham Low:
Security and control issues in local area network design. 283-290 - Kor IJ. Mollema, Ad P. M. Smulders:
Prerequisites for data control. 291-296 - Fred Cohen:
Computational aspects of computer viruses. 297-298 - Clinton E. White Jr.:
Viruses and worms: A campus under attack. 303 - Phillip E. Gardner:
The internet worm: What was said and when. 305-316 - Bernard P. Zajac Jr.:
Disaster recovery - are you really ready? 317-323 - Lance J. Hoffman:
Smoking out the bad actors: Risk analysis in the age of the microcomputer. 325-344 - Esther H. Highland:
Abstracts of recent articles and literature. 353-361
Volume 8, Number 5, August 1989
- Harold Joseph Highland:
From the editor. 366-367 - Harold Joseph Highland:
Random bits & bytes. 369-380 - Harry B. DeMaio:
Viruses-a management issue. 381-388 - Belden Menkus:
It's time to rethink data processing fire protection. 389-394 - G. J. Bologna:
Twenty-two reasons why MIS subordinates don't measure up to their bosses' expectations. 395-396 - Holger Bürk, Andreas Pfitzmann:
Digital payment systems enabling security and unobservability. 399-416 - W. H. Boshoff, Sebastiaan H. von Solms:
A path context model for addressing security in potentially non-secure environments. 417-425 - Simon R. Wiseman:
Preventing viruses in computer systems. 427-432 - Karin P. Badenhorst, Jan H. P. Eloff:
Framework of a methodology for the life cycle of computer security in an organization. 433-442 - Esther H. Highland:
Abstracts of recent articles and literature. 445-455
Volume 8, Number 6, October 1989
- Harold Joseph Highland:
From the editor. 458-459 - Harold Joseph Highland:
Random bits & bytes. 460-478 - Phillip E. Gardner:
Evaluation of five risk assessment programs. 479-485 - Belden Menkus:
The employee's role in protecting information assets. 487-492 - C. L. Harrold:
An introduction to the SMITE approach to secure computing. 495-505 - Raju Ramaswamy:
Placement of data integrity security services in open systems interconnection architecture. 507-516 - Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham:
SODA: A secure object-oriented database system. 517-533 - Esther H. Highland:
Abstracts of recent articles and literature. 537-546
Volume 8, Number 7, November 1989
- Harold Joseph Highland:
Random bits & bytes. 553-561 - Harold Joseph Highland:
Secret disk II - administrator. 563-568 - Bruce L. Riddle, Murray S. Miron, Judith A. Semo:
Passwords in use in a university timesharing environment. 569-579 - Belden Menkus:
Computer-related fire problems revisited. 581-586 - David L. Jobusch, Arthur E. Oldehoeft:
A survey of password mechanisms: Weaknesses and potential improvements. Part 1. 587-604 - Khosrow Dehnad:
A simple way of improving the login security. 607-611 - Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos:
A methodology for penetration testing. 613-620 - Dieter Bong, Christoph Ruland:
Optimized software implementations of the modular exponentiation on general purpose microprocessors. 621-630
Volume 8, Number 8, December 1989
- Harold Joseph Highland:
From the editor. 644-646 - Harold Joseph Highland:
Random bits & bytes. 647-657 - Harold Joseph Highland:
Datacrime virus and new anti-virus products. 659-661 - Charles Preston:
Review of VIRUSCAN. 663-668 - Harold Joseph Highland:
VCHECKER - a virus search program. 669-674 - David L. Jobusch, Arthur E. Oldehoeft:
A survey of password mechanisms: Weaknesses and potential improvements. Part 2. 675-689 - Vijay Varadharajan:
Verification of network security protocols. 693-708 - Raju Ramaswamy:
Security architecture for data transfer through TCP/IP protocols. 709-720 - Bhavani M. Thuraisingham:
A functional view of multilevel databases. 721-730

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.