default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec7.bht:"
@article{DBLP:journals/compsec/AhituvLN88, author = {Niv Ahituv and Yeheskel Lapid and Seev Neumann}, title = {Protecting statistical databases against retrieval of private information}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {59--63}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90504-4}, doi = {10.1016/0167-4048(88)90504-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhituvLN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Amsel88, author = {Ellen Amsel}, title = {Network security and access controls}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {53--57}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90503-2}, doi = {10.1016/0167-4048(88)90503-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Amsel88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BankA88, author = {Dirk Van der Bank and Edwin Anderssen}, title = {Cryptographic figures of merit}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {299--303}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90036-3}, doi = {10.1016/0167-4048(88)90036-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BankA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Biene-Hershey88, author = {Margaret E. van Biene{-}Hershey}, title = {The technical EDP-audit function}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {271--277}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90033-8}, doi = {10.1016/0167-4048(88)90033-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Biene-Hershey88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BiskupB88, author = {Joachim Biskup and Hans Hermann Br{\"{u}}ggemann}, title = {The personal model of data: Towards a privacy-oriented information system}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {575--597}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90009-0}, doi = {10.1016/0167-4048(88)90009-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BiskupB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna88, author = {G. J. Bologna}, title = {Pitfalls in measuring {MIS} performance}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {137--138}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90326-4}, doi = {10.1016/0167-4048(88)90326-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna88a, author = {Jack Bologna}, title = {Managing an information system crisis}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {245--247}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90026-0}, doi = {10.1016/0167-4048(88)90026-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna88b, author = {Jack Bologna}, title = {Selection risks in hiring information systems personnel}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {353--355}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90573-1}, doi = {10.1016/0167-4048(88)90573-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna88c, author = {Jack Bologna}, title = {Soviet white-collar crime and criminal justice}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {553--556}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90005-3}, doi = {10.1016/0167-4048(88)90005-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bound88, author = {William A. J. Bound}, title = {Discussing security with top management}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {129--130}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90323-9}, doi = {10.1016/0167-4048(88)90323-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bound88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Carroll88, author = {John M. Carroll}, title = {Implementing multilevel security by violation privilege}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {563--573}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90008-9}, doi = {10.1016/0167-4048(88)90008-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Carroll88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarrollMRW88, author = {John M. Carroll and Robert B. Mowat and Lynda E. Robbins and David Wiseman}, title = {The password predictor - a training aid for raising security awareness}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {475--481}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90200-3}, doi = {10.1016/0167-4048(88)90200-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarrollMRW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Christoffersson88, author = {Per Christoffersson}, title = {Message authentication and encryption combined}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {65--71}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90505-6}, doi = {10.1016/0167-4048(88)90505-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Christoffersson88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen88, author = {Fred Cohen}, title = {On the implications of computer viruses and methods of defense}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {167--184}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90334-3}, doi = {10.1016/0167-4048(88)90334-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Cohen88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen88a, author = {Fred Cohen}, title = {Designing provably correct information networks with digital diodes}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {279--286}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90034-X}, doi = {10.1016/0167-4048(88)90034-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen88b, author = {Frederick Cohen}, title = {Ethical issues in computer virus distribution}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {335--336}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90562-7}, doi = {10.1016/0167-4048(88)90562-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen88c, author = {Fred Cohen}, title = {Maintaining a poor person's information integrity}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {489--494}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90202-7}, doi = {10.1016/0167-4048(88)90202-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CohenB88, author = {Fred Cohen and Stephen Bruhns}, title = {Two secure file servers}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {409--414}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90581-0}, doi = {10.1016/0167-4048(88)90581-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CohenB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Courtney88, author = {Robert H. Courtney Jr.}, title = {Another perspective on sensitive but unclassified data}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {19--23}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90496-8}, doi = {10.1016/0167-4048(88)90496-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Courtney88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/David88, author = {Jon David}, title = {Treating viral fever}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {255--258}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90029-6}, doi = {10.1016/0167-4048(88)90029-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/David88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Eloff88, author = {Jan H. P. Eloff}, title = {Computer security policy: Important issues}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {559--562}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90007-7}, doi = {10.1016/0167-4048(88)90007-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Eloff88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Fak88, author = {Viiveke F{\aa}k}, title = {Are we vulnerable to a virus attack? {A} report from Sweden}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {151--155}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90329-X}, doi = {10.1016/0167-4048(88)90329-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Fak88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Glath88, author = {Raymond M. Glath}, title = {The case of the "Gerbil virus" that wasn't}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {451--453}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90195-2}, doi = {10.1016/0167-4048(88)90195-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Glath88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Herschberg88, author = {I. S. Herschberg}, title = {Make the tigers hunt for you}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {197--203}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90336-7}, doi = {10.1016/0167-4048(88)90336-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Herschberg88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88, author = {Harold Joseph Highland}, title = {Case history of a virus attack}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {3--5}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90488-9}, doi = {10.1016/0167-4048(88)90488-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88a, author = {Harold Joseph Highland}, title = {Encryption, attacks and ethics}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {5--6}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90489-0}, doi = {10.1016/0167-4048(88)90489-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88aa, author = {Harold Joseph Highland}, title = {Hackers revisited}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {339}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90565-2}, doi = {10.1016/0167-4048(88)90565-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ab, author = {Harold Joseph Highland}, title = {New video terminal law}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {340}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90566-4}, doi = {10.1016/0167-4048(88)90566-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ac, author = {Harold Joseph Highland}, title = {Electromagnetic eavesdropping machines for christmas?}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {341}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90567-6}, doi = {10.1016/0167-4048(88)90567-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ad, author = {Harold Joseph Highland}, title = {Tips on terrorism}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {344}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90568-8}, doi = {10.1016/0167-4048(88)90568-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ae, author = {Harold Joseph Highland}, title = {Investigating a reported virus attack}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {344--345}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90569-X}, doi = {10.1016/0167-4048(88)90569-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88af, author = {Harold Joseph Highland}, title = {Virus filter update}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {345}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90570-6}, doi = {10.1016/0167-4048(88)90570-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ag, author = {Harold Joseph Highland}, title = {The anatomy of a {DOS} Disk}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {357--360}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90574-3}, doi = {10.1016/0167-4048(88)90574-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ah, author = {Harold Joseph Highland}, title = {The brain virus: Fact and fantasy}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {367--370}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90576-7}, doi = {10.1016/0167-4048(88)90576-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ah.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ai, author = {Harold Joseph Highland}, title = {From the editor}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {438}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90189-7}, doi = {10.1016/0167-4048(88)90189-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ai.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88aj, author = {Harold Joseph Highland}, title = {{U.S.} Congress computer virus report}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {439}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90190-3}, doi = {10.1016/0167-4048(88)90190-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88aj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ak, author = {Harold Joseph Highland}, title = {Write-protect tab warning}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {439}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90191-5}, doi = {10.1016/0167-4048(88)90191-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ak.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88al, author = {Harold Joseph Highland}, title = {Virus filter evaluation}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {440}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90192-7}, doi = {10.1016/0167-4048(88)90192-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88al.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88am, author = {Harold Joseph Highland}, title = {Virus filter update}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {441--442}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90193-9}, doi = {10.1016/0167-4048(88)90193-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland88am.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88an, author = {Harold Joseph Highland}, title = {Computer viruses: Media hyperbole, errors and ignorance}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {442--450}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90194-0}, doi = {10.1016/0167-4048(88)90194-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88an.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ao, author = {Harold Joseph Highland}, title = {From the editor}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {532}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90001-6}, doi = {10.1016/0167-4048(88)90001-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ao.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88ap, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {533--541}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90002-8}, doi = {10.1016/0167-4048(88)90002-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland88ap.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88b, author = {Harold Joseph Highland}, title = {How to protect a microcomputer system}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {6--7}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90490-7}, doi = {10.1016/0167-4048(88)90490-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88c, author = {Harold Joseph Highland}, title = {Chernobyl computer communications}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {7--9}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90491-9}, doi = {10.1016/0167-4048(88)90491-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88d, author = {Harold Joseph Highland}, title = {Electromagnetic interference}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {9--10}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90492-0}, doi = {10.1016/0167-4048(88)90492-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88e, author = {Harold Joseph Highland}, title = {IFIP/Sec '88}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {10}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90493-2}, doi = {10.1016/0167-4048(88)90493-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88f, author = {Harold Joseph Highland}, title = {For your information}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {10--11}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90494-4}, doi = {10.1016/0167-4048(88)90494-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88g, author = {Harold Joseph Highland}, title = {Product reviews}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {13--18}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90495-6}, doi = {10.1016/0167-4048(88)90495-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88h, author = {Harold Joseph Highland}, title = {How secure are fiber optics communications?}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {25--26}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90497-X}, doi = {10.1016/0167-4048(88)90497-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88i, author = {Harold Joseph Highland}, title = {Secretdisk {II} - transparent automatic encryption}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {27--34}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90498-1}, doi = {10.1016/0167-4048(88)90498-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88j, author = {Harold Joseph Highland}, title = {Program aids for office automation security}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {37--43}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90500-7}, doi = {10.1016/0167-4048(88)90500-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88k, author = {Harold Joseph Highland}, title = {From the editor}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {114}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90320-3}, doi = {10.1016/0167-4048(88)90320-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland88k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88l, author = {Harold Joseph Highland}, title = {Anatomy of a virus attack}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {145--150}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90328-8}, doi = {10.1016/0167-4048(88)90328-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88m, author = {Harold Joseph Highland}, title = {An overview of 18 virus protection products}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {157--161}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90331-8}, doi = {10.1016/0167-4048(88)90331-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88n, author = {Harold Joseph Highland}, title = {How to combat a computer virus}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {157}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90332-X}, doi = {10.1016/0167-4048(88)90332-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88o, author = {Harold Joseph Highland}, title = {Open Sesame-Hackers welcome}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {232--233}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90018-1}, doi = {10.1016/0167-4048(88)90018-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88p, author = {Harold Joseph Highland}, title = {Security director's dilemma}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {233--235}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90019-3}, doi = {10.1016/0167-4048(88)90019-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88q, author = {Harold Joseph Highland}, title = {How to test a virus filter without a virus}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {235--237}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90020-X}, doi = {10.1016/0167-4048(88)90020-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88r, author = {Harold Joseph Highland}, title = {Virus disaster red book}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {237}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90021-1}, doi = {10.1016/0167-4048(88)90021-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88s, author = {Harold Joseph Highland}, title = {Blitzed by a computer virus}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {237--239}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90022-3}, doi = {10.1016/0167-4048(88)90022-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88t, author = {Harold Joseph Highland}, title = {Special virus protection measures}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {239--242}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90023-5}, doi = {10.1016/0167-4048(88)90023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88u, author = {Harold Joseph Highland}, title = {Upcoming conferences of note}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {242--243}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90024-7}, doi = {10.1016/0167-4048(88)90024-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88v, author = {Harold Joseph Highland}, title = {Star wars security or where did those micros go?}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {243--244}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90025-9}, doi = {10.1016/0167-4048(88)90025-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88w, author = {Harold Joseph Highland}, title = {Report on the fourth national computer security conference: {COMPSEC} {IV}}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {309--311}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90039-9}, doi = {10.1016/0167-4048(88)90039-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88x, author = {Harold Joseph Highland}, title = {From the editor}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {334}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90561-5}, doi = {10.1016/0167-4048(88)90561-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88y, author = {Harold Joseph Highland}, title = {How to obtain a computer virus}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {337}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90563-9}, doi = {10.1016/0167-4048(88)90563-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland88z, author = {Harold Joseph Highland}, title = {Are virus attack statistics reliable?}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {338}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90564-0}, doi = {10.1016/0167-4048(88)90564-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland88z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highlands88, author = {Harold Joseph Highland}, title = {From the editor}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {228}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90016-8}, doi = {10.1016/0167-4048(88)90016-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highlands88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangC88, author = {Yue Jiang Huang and Fred Cohen}, title = {Some weak points of one fast cryptographic checksum algorithm and its improvement}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {503--505}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90204-0}, doi = {10.1016/0167-4048(88)90204-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuangC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuntDSHS88, author = {Teresa F. Lunt and Dorothy E. Denning and Roger R. Schell and Mark R. Heckman and William R. Shockley}, title = {Element-level classification with {A1} assurance}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {73--82}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90506-8}, doi = {10.1016/0167-4048(88)90506-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuntDSHS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Madsen88, author = {C. Wayne Madsen}, title = {The world meganetwork and terrorism}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {347--352}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90572-X}, doi = {10.1016/0167-4048(88)90572-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Madsen88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McHughT88, author = {John McHugh and Bhavani M. Thuraisingham}, title = {Multilevel security issues in distributed database management systems}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {387--396}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90579-2}, doi = {10.1016/0167-4048(88)90579-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McHughT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus88, author = {Belden Menkus}, title = {Getting started in data processing disaster recovery}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {47--52}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90502-0}, doi = {10.1016/0167-4048(88)90502-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus88a, author = {Belden Menkus}, title = {Understanding the use of passwords}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {132--136}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90325-2}, doi = {10.1016/0167-4048(88)90325-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus88b, author = {Belden Menkus}, title = {Breakpoints}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {261--268}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90031-4}, doi = {10.1016/0167-4048(88)90031-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus88c, author = {Belden Menkus}, title = {{U.S.} Government agencies belatedly address information system security issues}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {361--366}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90575-5}, doi = {10.1016/0167-4048(88)90575-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus88d, author = {Belden Menkus}, title = {Understanding password compromise}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {549--552}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90004-1}, doi = {10.1016/0167-4048(88)90004-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Milor88, author = {G. Will Milor}, title = {The computer security act of 1987}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {251--253}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90028-4}, doi = {10.1016/0167-4048(88)90028-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Milor88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellW88, author = {Chris J. Mitchell and Michael Walker}, title = {Solutions to the multidestination secure electronic mail problem}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {483--488}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90201-5}, doi = {10.1016/0167-4048(88)90201-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Murray88, author = {William Hugh Murray}, title = {The application of epidemiology to computer viruses}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {139--145}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90327-6}, doi = {10.1016/0167-4048(88)90327-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Murray88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Paans88, author = {Ronald Paans}, title = {The second European conference on computer audit, control and security}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {312--315}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90040-5}, doi = {10.1016/0167-4048(88)90040-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Paans88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PfleegerP88, author = {Charles P. Pfleeger and Shari Lawrence Pfleeger}, title = {A transaction flow approach to software security certification for document handling systems}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {495--502}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90203-9}, doi = {10.1016/0167-4048(88)90203-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PfleegerP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pluimakers88, author = {G. M. J. Pluimakers}, title = {Some notes on authorization and transaction management in distributed database systems}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {287--298}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90035-1}, doi = {10.1016/0167-4048(88)90035-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pluimakers88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Salomaa88, author = {Arto Salomaa}, title = {A public-key cryptosystem based on language theory}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {83--87}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90507-X}, doi = {10.1016/0167-4048(88)90507-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Salomaa88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sandhu88, author = {Ravinderpal Singh Sandhu}, title = {Nested categories for access control}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {599--605}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90010-7}, doi = {10.1016/0167-4048(88)90010-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sandhu88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schweitzer88, author = {James A. Schweitzer}, title = {Security news briefs}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {467--469}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90197-6}, doi = {10.1016/0167-4048(88)90197-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schweitzer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Stoll88, author = {Cliff Stoll}, title = {How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {543--547}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90003-X}, doi = {10.1016/0167-4048(88)90003-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Stoll88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Straub88, author = {Detmar W. Straub Jr.}, title = {Organizational structuring of the computer security function}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {185--195}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90335-5}, doi = {10.1016/0167-4048(88)90335-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Straub88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SummersK88, author = {Rita C. Summers and Stanley A. Kurzban}, title = {Potential applications of knowledge-based methods to computer security}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {373--385}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90578-0}, doi = {10.1016/0167-4048(88)90578-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SummersK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WittenC88, author = {Ian H. Witten and John G. Cleary}, title = {On the privacy afforded by adaptive text compression}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {397--408}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90580-9}, doi = {10.1016/0167-4048(88)90580-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WittenC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood88, author = {Charles Cresson Wood}, title = {A context for information systems security planning}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {455--465}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90196-4}, doi = {10.1016/0167-4048(88)90196-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {101--110}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88a, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {213--223}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88b, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {320--331}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88c, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {4}, pages = {423--434}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88d, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {509--520}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88e, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {521--529}, year = {1988}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X88e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X88f, title = {Abstracts of recent articles and literature}, journal = {Comput. Secur.}, volume = {7}, number = {6}, pages = {609--615}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90012-0}, doi = {10.1016/0167-4048(88)90012-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/X88f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac88, author = {Bernard P. Zajac Jr.}, title = {Dial-up communication lines: Can they be secured?}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {35--36}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90499-3}, doi = {10.1016/0167-4048(88)90499-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac88a, author = {Bernard P. Zajac Jr.}, title = {Personnel: The other half of data security}, journal = {Comput. Secur.}, volume = {7}, number = {2}, pages = {131--132}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90324-0}, doi = {10.1016/0167-4048(88)90324-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac88b, author = {Bernard P. Zajac Jr.}, title = {Distributed data processing: New problems}, journal = {Comput. Secur.}, volume = {7}, number = {3}, pages = {249--250}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90027-2}, doi = {10.1016/0167-4048(88)90027-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac88c, author = {Bernard P. Zajac Jr.}, title = {Viruses: Should we quit talking about them?}, journal = {Comput. Secur.}, volume = {7}, number = {5}, pages = {471--472}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90198-8}, doi = {10.1016/0167-4048(88)90198-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.