1985 export record
dblp key:
journals/compsec/Auerbach85 share record
persistent URL:
Isaac L. Auerbach : Professional responsibility for information privacy. Comput. Secur. 4 (2 ) : 103-107 (1985 )export record
dblp key:
journals/compsec/Bruyne85 share record
persistent URL:
Pieter de Bruyne : Signature verification using holistic measures. Comput. Secur. 4 (4 ) : 309-315 (1985 )export record
dblp key:
journals/compsec/CarrollI85 share record
persistent URL:
John M. Carroll , W. R. Mac Iver : COSSAC: a framework for analyzing and configuring secure computer facilities. Comput. Secur. 4 (1 ) : 5-12 (1985 )export record
dblp key:
journals/compsec/Cerullo85 share record
persistent URL:
Michael J. Cerullo : General controls in computer systems. Comput. Secur. 4 (1 ) : 33-45 (1985 )export record
dblp key:
journals/compsec/Chamoux85 share record
persistent URL:
Jean-Pierre Chamoux : Data security and confidentiality in Europe. Comput. Secur. 4 (3 ) : 207-210 (1985 )share record
persistent URL:
Fred Cohen : A secure computer network design. Comput. Secur. 4 (3 ) : 189-205 (1985 )share record
persistent URL:
A. J. du Croix : Data sharing and access protection in business system 12. Comput. Secur. 4 (4 ) : 317-323 (1985 )share record
persistent URL:
Wim van Eck : Electromagnetic radiation from video display units: An eavesdropping risk? Comput. Secur. 4 (4 ) : 269-286 (1985 )share record
persistent URL:
Jan H. P. Eloff : The development of a specification language for a computer security system. Comput. Secur. 4 (2 ) : 143-147 (1985 )share record
persistent URL:
Graham Gal , William E. McCarthy : Specification of internal accounting controls in a database environment. Comput. Secur. 4 (1 ) : 23-32 (1985 )export record
dblp key:
journals/compsec/Highland85 share record
persistent URL:
Harold Joseph Highland : Editorial. Comput. Secur. 4 (1 ) : 1-2 (1985 )export record
dblp key:
journals/compsec/Highland85a share record
persistent URL:
Harold Joseph Highland : The first national computer security conference. Comput. Secur. 4 (1 ) : 65-73 (1985 )export record
dblp key:
journals/compsec/Highland85b share record
persistent URL:
Harold Joseph Highland : Editorial. Comput. Secur. 4 (2 ) : 101-102 (1985 )export record
dblp key:
journals/compsec/Highland85c share record
persistent URL:
Harold Joseph Highland : Microcomputer security: Data protection techniques. Comput. Secur. 4 (2 ) : 123-134 (1985 )export record
dblp key:
journals/compsec/Highland85d share record
persistent URL:
Harold Joseph Highland : Editorial : Office automation or on the value of being a dinosaur. Comput. Secur. 4 (3 ) : 185-186 (1985 )export record
dblp key:
journals/compsec/Highland85e share record
persistent URL:
Harold Joseph Highland : U.S. computer crime legislation highlighted in special report. Comput. Secur. 4 (3 ) : 245-246 (1985 )export record
dblp key:
journals/compsec/Highland85f share record
persistent URL:
Harold Joseph Highland : Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95. Comput. Secur. 4 (3 ) : 247 (1985 )export record
dblp key:
journals/compsec/Highland85g share record
persistent URL:
Harold Joseph Highland : Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95. Comput. Secur. 4 (3 ) : 247-248 (1985 )export record
dblp key:
journals/compsec/Highland85h share record
persistent URL:
Harold Joseph Highland : Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25. Comput. Secur. 4 (3 ) : 249 (1985 )export record
dblp key:
journals/compsec/Highland85i share record
persistent URL:
Esther Harris Highland : Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ US $28.75. Comput. Secur. 4 (3 ) : 249 (1985 )export record
dblp key:
journals/compsec/Highland85j share record
persistent URL:
Esther Harris Highland : Proceedings of the seventh computer security group conference : Washington: US government printing office, 1984 - 776-101/1027. 115 pages. Comput. Secur. 4 (3 ) : 249-250 (1985 )export record
dblp key:
journals/compsec/Highland85k share record
persistent URL:
Harold Joseph Highland : Editorial. Comput. Secur. 4 (4 ) : 267-268 (1985 )export record
dblp key:
journals/compsec/HovingE85 share record
persistent URL:
Per L. Hoving , Johan Essén : Minutes from the first meeting of TC 11, security and protection in information processing systems. Comput. Secur. 4 (2 ) : 149-152 (1985 )export record
dblp key:
journals/compsec/Menkus85 share record
persistent URL:
Belden Menkus : The EDP auditor's role in computer security. Comput. Secur. 4 (2 ) : 135-138 (1985 )export record
dblp key:
journals/compsec/Menkus85a share record
persistent URL:
Belden Menkus : The impact of the Bell system breakup on DP disaster recovery planning. Comput. Secur. 4 (3 ) : 219-222 (1985 )export record
dblp key:
journals/compsec/Miller85 share record
persistent URL:
James E. Miller : Transaction controls: Steps to take after the equipment has been secured. Comput. Secur. 4 (2 ) : 139-141 (1985 )export record
dblp key:
journals/compsec/PieprzykR85 share record
persistent URL:
Józef P. Pieprzyk , Dominik Rutkowski : Modular design of information encipherment for computer systems. Comput. Secur. 4 (3 ) : 211-218 (1985 )export record
dblp key:
journals/compsec/PieprzykR85a share record
persistent URL:
Józef P. Pieprzyk , Dominik Rutkowski : Design of public key cryptosystems using idempotent elements. Comput. Secur. 4 (4 ) : 297-308 (1985 )export record
dblp key:
journals/compsec/Schweitzer85 share record
persistent URL:
James A. Schweitzer : A management view: computer security as a discretionary decision. Comput. Secur. 4 (1 ) : 13-22 (1985 )export record
dblp key:
journals/compsec/Serpell85 share record
persistent URL:
Stephen C. Serpell : Cryptographic equipment security: a code of practice. Comput. Secur. 4 (1 ) : 47-64 (1985 )