Search dblp for Publications

export results for "toc:db/journals/compsec/compsec7.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AhituvLN88,
  author       = {Niv Ahituv and
                  Yeheskel Lapid and
                  Seev Neumann},
  title        = {Protecting statistical databases against retrieval of private information},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {59--63},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90504-4},
  doi          = {10.1016/0167-4048(88)90504-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhituvLN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Amsel88,
  author       = {Ellen Amsel},
  title        = {Network security and access controls},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {53--57},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90503-2},
  doi          = {10.1016/0167-4048(88)90503-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Amsel88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BankA88,
  author       = {Dirk Van der Bank and
                  Edwin Anderssen},
  title        = {Cryptographic figures of merit},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {299--303},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90036-3},
  doi          = {10.1016/0167-4048(88)90036-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BankA88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Biene-Hershey88,
  author       = {Margaret E. van Biene{-}Hershey},
  title        = {The technical EDP-audit function},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {271--277},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90033-8},
  doi          = {10.1016/0167-4048(88)90033-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Biene-Hershey88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BiskupB88,
  author       = {Joachim Biskup and
                  Hans Hermann Br{\"{u}}ggemann},
  title        = {The personal model of data: Towards a privacy-oriented information
                  system},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {575--597},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90009-0},
  doi          = {10.1016/0167-4048(88)90009-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BiskupB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna88,
  author       = {G. J. Bologna},
  title        = {Pitfalls in measuring {MIS} performance},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {137--138},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90326-4},
  doi          = {10.1016/0167-4048(88)90326-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna88a,
  author       = {Jack Bologna},
  title        = {Managing an information system crisis},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {245--247},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90026-0},
  doi          = {10.1016/0167-4048(88)90026-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna88b,
  author       = {Jack Bologna},
  title        = {Selection risks in hiring information systems personnel},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {353--355},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90573-1},
  doi          = {10.1016/0167-4048(88)90573-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna88c,
  author       = {Jack Bologna},
  title        = {Soviet white-collar crime and criminal justice},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {553--556},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90005-3},
  doi          = {10.1016/0167-4048(88)90005-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bound88,
  author       = {William A. J. Bound},
  title        = {Discussing security with top management},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {129--130},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90323-9},
  doi          = {10.1016/0167-4048(88)90323-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bound88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Carroll88,
  author       = {John M. Carroll},
  title        = {Implementing multilevel security by violation privilege},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {563--573},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90008-9},
  doi          = {10.1016/0167-4048(88)90008-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Carroll88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarrollMRW88,
  author       = {John M. Carroll and
                  Robert B. Mowat and
                  Lynda E. Robbins and
                  David Wiseman},
  title        = {The password predictor - a training aid for raising security awareness},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {475--481},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90200-3},
  doi          = {10.1016/0167-4048(88)90200-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarrollMRW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Christoffersson88,
  author       = {Per Christoffersson},
  title        = {Message authentication and encryption combined},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {65--71},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90505-6},
  doi          = {10.1016/0167-4048(88)90505-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Christoffersson88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen88,
  author       = {Fred Cohen},
  title        = {On the implications of computer viruses and methods of defense},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {167--184},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90334-3},
  doi          = {10.1016/0167-4048(88)90334-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen88a,
  author       = {Fred Cohen},
  title        = {Designing provably correct information networks with digital diodes},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {279--286},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90034-X},
  doi          = {10.1016/0167-4048(88)90034-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen88b,
  author       = {Frederick Cohen},
  title        = {Ethical issues in computer virus distribution},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {335--336},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90562-7},
  doi          = {10.1016/0167-4048(88)90562-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen88c,
  author       = {Fred Cohen},
  title        = {Maintaining a poor person's information integrity},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {489--494},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90202-7},
  doi          = {10.1016/0167-4048(88)90202-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CohenB88,
  author       = {Fred Cohen and
                  Stephen Bruhns},
  title        = {Two secure file servers},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {409--414},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90581-0},
  doi          = {10.1016/0167-4048(88)90581-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CohenB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Courtney88,
  author       = {Robert H. Courtney Jr.},
  title        = {Another perspective on sensitive but unclassified data},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {19--23},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90496-8},
  doi          = {10.1016/0167-4048(88)90496-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Courtney88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/David88,
  author       = {Jon David},
  title        = {Treating viral fever},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {255--258},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90029-6},
  doi          = {10.1016/0167-4048(88)90029-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/David88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Eloff88,
  author       = {Jan H. P. Eloff},
  title        = {Computer security policy: Important issues},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {559--562},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90007-7},
  doi          = {10.1016/0167-4048(88)90007-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Eloff88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Fak88,
  author       = {Viiveke F{\aa}k},
  title        = {Are we vulnerable to a virus attack? {A} report from Sweden},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {151--155},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90329-X},
  doi          = {10.1016/0167-4048(88)90329-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Fak88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Glath88,
  author       = {Raymond M. Glath},
  title        = {The case of the "Gerbil virus" that wasn't},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {451--453},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90195-2},
  doi          = {10.1016/0167-4048(88)90195-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Glath88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Herschberg88,
  author       = {I. S. Herschberg},
  title        = {Make the tigers hunt for you},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {197--203},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90336-7},
  doi          = {10.1016/0167-4048(88)90336-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Herschberg88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88,
  author       = {Harold Joseph Highland},
  title        = {Case history of a virus attack},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {3--5},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90488-9},
  doi          = {10.1016/0167-4048(88)90488-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88a,
  author       = {Harold Joseph Highland},
  title        = {Encryption, attacks and ethics},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {5--6},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90489-0},
  doi          = {10.1016/0167-4048(88)90489-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88aa,
  author       = {Harold Joseph Highland},
  title        = {Hackers revisited},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {339},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90565-2},
  doi          = {10.1016/0167-4048(88)90565-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ab,
  author       = {Harold Joseph Highland},
  title        = {New video terminal law},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {340},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90566-4},
  doi          = {10.1016/0167-4048(88)90566-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ac,
  author       = {Harold Joseph Highland},
  title        = {Electromagnetic eavesdropping machines for christmas?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {341},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90567-6},
  doi          = {10.1016/0167-4048(88)90567-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ad,
  author       = {Harold Joseph Highland},
  title        = {Tips on terrorism},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {344},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90568-8},
  doi          = {10.1016/0167-4048(88)90568-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ae,
  author       = {Harold Joseph Highland},
  title        = {Investigating a reported virus attack},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {344--345},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90569-X},
  doi          = {10.1016/0167-4048(88)90569-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88af,
  author       = {Harold Joseph Highland},
  title        = {Virus filter update},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {345},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90570-6},
  doi          = {10.1016/0167-4048(88)90570-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ag,
  author       = {Harold Joseph Highland},
  title        = {The anatomy of a {DOS} Disk},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {357--360},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90574-3},
  doi          = {10.1016/0167-4048(88)90574-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ah,
  author       = {Harold Joseph Highland},
  title        = {The brain virus: Fact and fantasy},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {367--370},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90576-7},
  doi          = {10.1016/0167-4048(88)90576-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ai,
  author       = {Harold Joseph Highland},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {438},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90189-7},
  doi          = {10.1016/0167-4048(88)90189-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ai.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88aj,
  author       = {Harold Joseph Highland},
  title        = {{U.S.} Congress computer virus report},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {439},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90190-3},
  doi          = {10.1016/0167-4048(88)90190-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88aj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ak,
  author       = {Harold Joseph Highland},
  title        = {Write-protect tab warning},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {439},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90191-5},
  doi          = {10.1016/0167-4048(88)90191-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88al,
  author       = {Harold Joseph Highland},
  title        = {Virus filter evaluation},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {440},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90192-7},
  doi          = {10.1016/0167-4048(88)90192-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88al.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88am,
  author       = {Harold Joseph Highland},
  title        = {Virus filter update},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {441--442},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90193-9},
  doi          = {10.1016/0167-4048(88)90193-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88am.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88an,
  author       = {Harold Joseph Highland},
  title        = {Computer viruses: Media hyperbole, errors and ignorance},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {442--450},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90194-0},
  doi          = {10.1016/0167-4048(88)90194-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88an.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ao,
  author       = {Harold Joseph Highland},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {532},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90001-6},
  doi          = {10.1016/0167-4048(88)90001-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ao.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88ap,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {533--541},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90002-8},
  doi          = {10.1016/0167-4048(88)90002-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88ap.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88b,
  author       = {Harold Joseph Highland},
  title        = {How to protect a microcomputer system},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {6--7},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90490-7},
  doi          = {10.1016/0167-4048(88)90490-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88c,
  author       = {Harold Joseph Highland},
  title        = {Chernobyl computer communications},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {7--9},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90491-9},
  doi          = {10.1016/0167-4048(88)90491-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88d,
  author       = {Harold Joseph Highland},
  title        = {Electromagnetic interference},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {9--10},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90492-0},
  doi          = {10.1016/0167-4048(88)90492-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88e,
  author       = {Harold Joseph Highland},
  title        = {IFIP/Sec '88},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {10},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90493-2},
  doi          = {10.1016/0167-4048(88)90493-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88f,
  author       = {Harold Joseph Highland},
  title        = {For your information},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {10--11},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90494-4},
  doi          = {10.1016/0167-4048(88)90494-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88g,
  author       = {Harold Joseph Highland},
  title        = {Product reviews},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {13--18},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90495-6},
  doi          = {10.1016/0167-4048(88)90495-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88h,
  author       = {Harold Joseph Highland},
  title        = {How secure are fiber optics communications?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {25--26},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90497-X},
  doi          = {10.1016/0167-4048(88)90497-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88i,
  author       = {Harold Joseph Highland},
  title        = {Secretdisk {II} - transparent automatic encryption},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {27--34},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90498-1},
  doi          = {10.1016/0167-4048(88)90498-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88j,
  author       = {Harold Joseph Highland},
  title        = {Program aids for office automation security},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {37--43},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90500-7},
  doi          = {10.1016/0167-4048(88)90500-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88k,
  author       = {Harold Joseph Highland},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {114},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90320-3},
  doi          = {10.1016/0167-4048(88)90320-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88l,
  author       = {Harold Joseph Highland},
  title        = {Anatomy of a virus attack},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {145--150},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90328-8},
  doi          = {10.1016/0167-4048(88)90328-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88m,
  author       = {Harold Joseph Highland},
  title        = {An overview of 18 virus protection products},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {157--161},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90331-8},
  doi          = {10.1016/0167-4048(88)90331-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88n,
  author       = {Harold Joseph Highland},
  title        = {How to combat a computer virus},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {157},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90332-X},
  doi          = {10.1016/0167-4048(88)90332-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88o,
  author       = {Harold Joseph Highland},
  title        = {Open Sesame-Hackers welcome},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {232--233},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90018-1},
  doi          = {10.1016/0167-4048(88)90018-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88p,
  author       = {Harold Joseph Highland},
  title        = {Security director's dilemma},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {233--235},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90019-3},
  doi          = {10.1016/0167-4048(88)90019-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88q,
  author       = {Harold Joseph Highland},
  title        = {How to test a virus filter without a virus},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {235--237},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90020-X},
  doi          = {10.1016/0167-4048(88)90020-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88r,
  author       = {Harold Joseph Highland},
  title        = {Virus disaster red book},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {237},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90021-1},
  doi          = {10.1016/0167-4048(88)90021-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88s,
  author       = {Harold Joseph Highland},
  title        = {Blitzed by a computer virus},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {237--239},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90022-3},
  doi          = {10.1016/0167-4048(88)90022-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88t,
  author       = {Harold Joseph Highland},
  title        = {Special virus protection measures},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {239--242},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90023-5},
  doi          = {10.1016/0167-4048(88)90023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88u,
  author       = {Harold Joseph Highland},
  title        = {Upcoming conferences of note},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {242--243},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90024-7},
  doi          = {10.1016/0167-4048(88)90024-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88v,
  author       = {Harold Joseph Highland},
  title        = {Star wars security or where did those micros go?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {243--244},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90025-9},
  doi          = {10.1016/0167-4048(88)90025-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88w,
  author       = {Harold Joseph Highland},
  title        = {Report on the fourth national computer security conference: {COMPSEC}
                  {IV}},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {309--311},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90039-9},
  doi          = {10.1016/0167-4048(88)90039-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88x,
  author       = {Harold Joseph Highland},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {334},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90561-5},
  doi          = {10.1016/0167-4048(88)90561-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88y,
  author       = {Harold Joseph Highland},
  title        = {How to obtain a computer virus},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {337},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90563-9},
  doi          = {10.1016/0167-4048(88)90563-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland88z,
  author       = {Harold Joseph Highland},
  title        = {Are virus attack statistics reliable?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {338},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90564-0},
  doi          = {10.1016/0167-4048(88)90564-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland88z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highlands88,
  author       = {Harold Joseph Highland},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {228},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90016-8},
  doi          = {10.1016/0167-4048(88)90016-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highlands88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangC88,
  author       = {Yue Jiang Huang and
                  Fred Cohen},
  title        = {Some weak points of one fast cryptographic checksum algorithm and
                  its improvement},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {503--505},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90204-0},
  doi          = {10.1016/0167-4048(88)90204-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangC88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuntDSHS88,
  author       = {Teresa F. Lunt and
                  Dorothy E. Denning and
                  Roger R. Schell and
                  Mark R. Heckman and
                  William R. Shockley},
  title        = {Element-level classification with {A1} assurance},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {73--82},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90506-8},
  doi          = {10.1016/0167-4048(88)90506-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuntDSHS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Madsen88,
  author       = {C. Wayne Madsen},
  title        = {The world meganetwork and terrorism},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {347--352},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90572-X},
  doi          = {10.1016/0167-4048(88)90572-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Madsen88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McHughT88,
  author       = {John McHugh and
                  Bhavani M. Thuraisingham},
  title        = {Multilevel security issues in distributed database management systems},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {387--396},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90579-2},
  doi          = {10.1016/0167-4048(88)90579-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McHughT88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus88,
  author       = {Belden Menkus},
  title        = {Getting started in data processing disaster recovery},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {47--52},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90502-0},
  doi          = {10.1016/0167-4048(88)90502-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus88a,
  author       = {Belden Menkus},
  title        = {Understanding the use of passwords},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {132--136},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90325-2},
  doi          = {10.1016/0167-4048(88)90325-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus88b,
  author       = {Belden Menkus},
  title        = {Breakpoints},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {261--268},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90031-4},
  doi          = {10.1016/0167-4048(88)90031-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus88c,
  author       = {Belden Menkus},
  title        = {{U.S.} Government agencies belatedly address information system security
                  issues},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {361--366},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90575-5},
  doi          = {10.1016/0167-4048(88)90575-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus88d,
  author       = {Belden Menkus},
  title        = {Understanding password compromise},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {549--552},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90004-1},
  doi          = {10.1016/0167-4048(88)90004-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Milor88,
  author       = {G. Will Milor},
  title        = {The computer security act of 1987},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {251--253},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90028-4},
  doi          = {10.1016/0167-4048(88)90028-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Milor88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellW88,
  author       = {Chris J. Mitchell and
                  Michael Walker},
  title        = {Solutions to the multidestination secure electronic mail problem},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {483--488},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90201-5},
  doi          = {10.1016/0167-4048(88)90201-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Murray88,
  author       = {William Hugh Murray},
  title        = {The application of epidemiology to computer viruses},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {139--145},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90327-6},
  doi          = {10.1016/0167-4048(88)90327-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Murray88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Paans88,
  author       = {Ronald Paans},
  title        = {The second European conference on computer audit, control and security},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {312--315},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90040-5},
  doi          = {10.1016/0167-4048(88)90040-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Paans88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PfleegerP88,
  author       = {Charles P. Pfleeger and
                  Shari Lawrence Pfleeger},
  title        = {A transaction flow approach to software security certification for
                  document handling systems},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {495--502},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90203-9},
  doi          = {10.1016/0167-4048(88)90203-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PfleegerP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pluimakers88,
  author       = {G. M. J. Pluimakers},
  title        = {Some notes on authorization and transaction management in distributed
                  database systems},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {287--298},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90035-1},
  doi          = {10.1016/0167-4048(88)90035-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pluimakers88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Salomaa88,
  author       = {Arto Salomaa},
  title        = {A public-key cryptosystem based on language theory},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {83--87},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90507-X},
  doi          = {10.1016/0167-4048(88)90507-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Salomaa88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sandhu88,
  author       = {Ravinderpal Singh Sandhu},
  title        = {Nested categories for access control},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {599--605},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90010-7},
  doi          = {10.1016/0167-4048(88)90010-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sandhu88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schweitzer88,
  author       = {James A. Schweitzer},
  title        = {Security news briefs},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {467--469},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90197-6},
  doi          = {10.1016/0167-4048(88)90197-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schweitzer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Stoll88,
  author       = {Cliff Stoll},
  title        = {How secure are computers in the U.S.A.?: An analysis of a series of
                  attacks on Milnet computers},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {543--547},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90003-X},
  doi          = {10.1016/0167-4048(88)90003-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Stoll88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Straub88,
  author       = {Detmar W. Straub Jr.},
  title        = {Organizational structuring of the computer security function},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {185--195},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90335-5},
  doi          = {10.1016/0167-4048(88)90335-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Straub88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SummersK88,
  author       = {Rita C. Summers and
                  Stanley A. Kurzban},
  title        = {Potential applications of knowledge-based methods to computer security},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {373--385},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90578-0},
  doi          = {10.1016/0167-4048(88)90578-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SummersK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WittenC88,
  author       = {Ian H. Witten and
                  John G. Cleary},
  title        = {On the privacy afforded by adaptive text compression},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {397--408},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90580-9},
  doi          = {10.1016/0167-4048(88)90580-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WittenC88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood88,
  author       = {Charles Cresson Wood},
  title        = {A context for information systems security planning},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {455--465},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90196-4},
  doi          = {10.1016/0167-4048(88)90196-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {101--110},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88a,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {213--223},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88b,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {320--331},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88c,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {423--434},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88d,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {509--520},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88e,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {521--529},
  year         = {1988},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/X88e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/X88f,
  title        = {Abstracts of recent articles and literature},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {6},
  pages        = {609--615},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90012-0},
  doi          = {10.1016/0167-4048(88)90012-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/X88f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac88,
  author       = {Bernard P. Zajac Jr.},
  title        = {Dial-up communication lines: Can they be secured?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {35--36},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90499-3},
  doi          = {10.1016/0167-4048(88)90499-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac88a,
  author       = {Bernard P. Zajac Jr.},
  title        = {Personnel: The other half of data security},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {131--132},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90324-0},
  doi          = {10.1016/0167-4048(88)90324-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac88b,
  author       = {Bernard P. Zajac Jr.},
  title        = {Distributed data processing: New problems},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {249--250},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90027-2},
  doi          = {10.1016/0167-4048(88)90027-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zajac88c,
  author       = {Bernard P. Zajac Jr.},
  title        = {Viruses: Should we quit talking about them?},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {471--472},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90198-8},
  doi          = {10.1016/0167-4048(88)90198-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zajac88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}