Search dblp for Publications

export results for "toc:db/journals/compsec/compsec14.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AbramsJ95,
  author       = {Marshall D. Abrams and
                  Michael V. Joyce},
  title        = {Trusted system concepts},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {45--56},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97025-6},
  doi          = {10.1016/0167-4048(95)97025-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbramsJ95a,
  author       = {Marshall D. Abrams and
                  Michael V. Joyce},
  title        = {Trusted computing update},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {57--68},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97026-7},
  doi          = {10.1016/0167-4048(95)97026-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsJ95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbramsJ95b,
  author       = {Marshall D. Abrams and
                  Michael V. Joyce},
  title        = {New thinking about information technology security},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {69--81},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97027-8},
  doi          = {10.1016/0167-4048(95)97027-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsJ95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbramsM95,
  author       = {Marshall D. Abrams and
                  Jonathan D. Moffett},
  title        = {A higher level of computer security through active policies},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {147--157},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97048-F},
  doi          = {10.1016/0167-4048(95)97048-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbramsZ95,
  author       = {Marshall D. Abrams and
                  Marvin V. Zelkowitz},
  title        = {Striving for correctness},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {719--738},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00022-4},
  doi          = {10.1016/0167-4048(95)00022-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbramsZ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BackhouseD95,
  author       = {James Backhouse and
                  Gurpreet Dhillon},
  title        = {Managing computer crime: a research outlook},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {645--651},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00024-0},
  doi          = {10.1016/0167-4048(95)00024-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BackhouseD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BishopK95,
  author       = {Matt Bishop and
                  Daniel V. Klein},
  title        = {Improving system security via proactive password checking},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {233--249},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00003-Q},
  doi          = {10.1016/0167-4048(95)00003-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BishopK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BooysenE95,
  author       = {H. A. S. Booysen and
                  Jan H. P. Eloff},
  title        = {Classification of objects for improved access control},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {251--265},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00001-O},
  doi          = {10.1016/0167-4048(95)00001-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BooysenE95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ClearyIR95,
  author       = {John G. Cleary and
                  Sean A. Irvine and
                  Ingrid Rinsma{-}Melchert},
  title        = {On the insecurity of arithmetic coding},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {167--180},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97050-K},
  doi          = {10.1016/0167-4048(95)97050-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ClearyIR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DeaneBHM95,
  author       = {Frank Deane and
                  Kate Barrelle and
                  Ron Henderson and
                  Doug Mahar},
  title        = {Perceived acceptability of biometric security systems},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {225--231},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00005-S},
  doi          = {10.1016/0167-4048(95)00005-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DeaneBHM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoumasMGK95,
  author       = {Anastasia Doumas and
                  Konstantinos Mavroudakis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Design of a neural network for recognition and classification of computer
                  viruses},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {435--448},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00008-V},
  doi          = {10.1016/0167-4048(95)00008-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoumasMGK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Duncan95,
  author       = {Rebecca J. Duncan},
  title        = {There are some cracks in the cornerstone of information security},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {675--680},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81707-X},
  doi          = {10.1016/0167-4048(96)81707-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Duncan95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EkenbergOO95,
  author       = {Love Ekenberg and
                  Subhash Oberoi and
                  Istv{\'{a}}n Orci},
  title        = {A cost model for managing information security hazards},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {707--717},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00021-6},
  doi          = {10.1016/0167-4048(95)00021-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EkenbergOO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gordon95,
  author       = {Sarah Gordon},
  title        = {Technologically enabled crime: Shifting paradigms for the Year 2000},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {391--402},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97090-W},
  doi          = {10.1016/0167-4048(95)97090-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gordon95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gordon95a,
  author       = {Sarah Gordon},
  title        = {Internet 101},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {599--604},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81666-X},
  doi          = {10.1016/0167-4048(96)81666-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gordon95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HardjonoS95,
  author       = {Thomas Hardjono and
                  Jennifer Seberry},
  title        = {Applications of smartcards for anonymous and verifiable databases},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {465--472},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00011-V},
  doi          = {10.1016/0167-4048(95)00011-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HardjonoS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Heinlein95,
  author       = {Edwin B. Heinlein},
  title        = {Principles of information systems security},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {197--198},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97052-C},
  doi          = {10.1016/0167-4048(95)97052-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Heinlein95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {4--13},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)96990-K},
  doi          = {10.1016/0167-4048(95)96990-K},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95a,
  author       = {Harold Joseph Highland},
  title        = {Random Bits {\&} Bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {90--102},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97028-9},
  doi          = {10.1016/0167-4048(95)97028-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95b,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {188--196},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97051-B},
  doi          = {10.1016/0167-4048(95)97051-B},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95c,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {274--282},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97067-K},
  doi          = {10.1016/0167-4048(95)97067-K},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95d,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {365--371},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97086-P},
  doi          = {10.1016/0167-4048(95)97086-P},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95e,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {480--488},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)99310-L},
  doi          = {10.1016/0167-4048(95)99310-L},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95f,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {574--585},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81664-6},
  doi          = {10.1016/0167-4048(96)81664-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland95g,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {660--666},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81705-6},
  doi          = {10.1016/0167-4048(96)81705-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland95g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HillS95,
  author       = {Scott Hill and
                  Martin Smith},
  title        = {Risk management {\&} corporate security: {A} viable leadership
                  and business solution designed to enhance corporations in the emerging
                  marketplace},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {199--204},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97053-D},
  doi          = {10.1016/0167-4048(95)97053-D},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HillS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hitchings95,
  author       = {Jean Hitchings},
  title        = {Deficiencies of the traditional approach to information security and
                  the requirements for a new methodology},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {377--383},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97088-R},
  doi          = {10.1016/0167-4048(95)97088-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hitchings95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Holloway95,
  author       = {Christopher L. J. Holloway},
  title        = {Controlling the use of cryptographic keys},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {587--598},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81665-8},
  doi          = {10.1016/0167-4048(96)81665-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Holloway95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Holloway95a,
  author       = {Christopher L. J. Holloway},
  title        = {Controlling digital signature services using a smartcard},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {681--690},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81708-1},
  doi          = {10.1016/0167-4048(96)81708-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Holloway95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KailayJ95,
  author       = {Muninder P. Kailay and
                  Peter Jarratt},
  title        = {RAMeX: a prototype expert system for computer security risk analysis
                  and management},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {449--463},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00013-X},
  doi          = {10.1016/0167-4048(95)00013-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KailayJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kim95,
  author       = {Hyun{-}jung Kim},
  title        = {Biometrics, is it a viable proposition for identity authentication
                  and access control?},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {205--214},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97054-E},
  doi          = {10.1016/0167-4048(95)97054-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kim95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Koning95,
  author       = {Fred de Koning},
  title        = {A methodology for the design of security plans},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {633--643},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00020-8},
  doi          = {10.1016/0167-4048(95)00020-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Koning95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich95,
  author       = {Gerald L. Kovacich},
  title        = {Recovering computer-generated evidence},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {289--296},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97070-Q},
  doi          = {10.1016/0167-4048(95)97070-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Krull95,
  author       = {Alan R. Krull},
  title        = {Controls in the next millennium: Anticipating the IT-enabled future},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {491--495},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)99312-D},
  doi          = {10.1016/0167-4048(95)99312-D},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Krull95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Leach95,
  author       = {John Leach},
  title        = {Dynamic authentication for smartcards},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {385--389},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97089-S},
  doi          = {10.1016/0167-4048(95)97089-S},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Leach95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lindup95,
  author       = {Kenneth R. Lindup},
  title        = {A new model for information security policies},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {691--695},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81709-3},
  doi          = {10.1016/0167-4048(96)81709-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lindup95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LoLO95,
  author       = {Raymond W. Lo and
                  Karl N. Levitt and
                  Ronald A. Olsson},
  title        = {{MCF:} a malicious code filter},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {541--566},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00012-W},
  doi          = {10.1016/0167-4048(95)00012-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LoLO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mohrenschlager95,
  author       = {Manfred M{\"{o}}hrenschlager},
  title        = {Hacking: To criminalize or not ? - suggestions for the legislature},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {103--112},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97029-A},
  doi          = {10.1016/0167-4048(95)97029-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mohrenschlager95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OShea95,
  author       = {Greg O'Shea},
  title        = {Redundant access rights},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {323--348},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00006-T},
  doi          = {10.1016/0167-4048(95)00006-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OShea95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Oliver95,
  author       = {Claude Oliver},
  title        = {Privacy, anonymity and accountability},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {489--490},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)99311-C},
  doi          = {10.1016/0167-4048(95)99311-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Oliver95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Reid95,
  author       = {Jim Reid},
  title        = {Open systems security: Traps and pitfalls},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {496--517},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)99313-E},
  doi          = {10.1016/0167-4048(95)99313-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Reid95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Shepherd95,
  author       = {Simon J. Shepherd},
  title        = {A high speed software implementation of the Data Encryption Standard},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {349--357},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00007-U},
  doi          = {10.1016/0167-4048(95)00007-U},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Shepherd95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SmithS95,
  author       = {Martin Smith and
                  John Sherwood},
  title        = {Business continuity planning},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {14--23},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)96991-B},
  doi          = {10.1016/0167-4048(95)96991-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SmithS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SohD95,
  author       = {Ben Soh and
                  Tharam S. Dillon},
  title        = {Setting optimal intrusion-detection thresholds},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {621--631},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00017-8},
  doi          = {10.1016/0167-4048(95)00017-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SohD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Stoll95,
  author       = {Frank Stoll},
  title        = {The need for decentralization and privacy in mobile communications
                  networks},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {527--539},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00014-Y},
  doi          = {10.1016/0167-4048(95)00014-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Stoll95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsaiC95,
  author       = {Hui{-}Min Tsai and
                  Chin{-}Chen Chang},
  title        = {A cryptographic implementation for dynamic access control in a user
                  hierarchy},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {159--166},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97049-G},
  doi          = {10.1016/0167-4048(95)97049-G},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsaiC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wiseman95,
  author       = {Simon R. Wiseman},
  title        = {Classification services in the {SWORD} secure {DBMS}},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {307--321},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00004-R},
  doi          = {10.1016/0167-4048(95)00004-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wiseman95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wolfe95,
  author       = {Henry B. Wolfe},
  title        = {Computer security: For fun and profit},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {113--115},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97030-E},
  doi          = {10.1016/0167-4048(95)97030-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wolfe95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood95,
  author       = {Charles Cresson Wood},
  title        = {Shifting information systems security responsibility from user organizations
                  to vendor/publisher organizations},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {283--284},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97068-L},
  doi          = {10.1016/0167-4048(95)97068-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood95a,
  author       = {Charles Cresson Wood},
  title        = {Writing infosec policies},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {8},
  pages        = {667--674},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(96)81706-8},
  doi          = {10.1016/0167-4048(96)81706-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WoodS95,
  author       = {Charles Cresson Wood and
                  Karen Snow},
  title        = {{ISO} 9000 and information security},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {287--288},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97069-M},
  doi          = {10.1016/0167-4048(95)97069-M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WoodS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuH95,
  author       = {Tzong{-}Chen Wu and
                  Wei{-}Hua He},
  title        = {A geometric approach for sharing secrets},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {135--145},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)97047-E},
  doi          = {10.1016/0167-4048(95)97047-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}