- Harold Joseph Highland:
Special virus protection measures. Comput. Secur. 7(3): 239-242 (1988) - Harold Joseph Highland:
Upcoming conferences of note. Comput. Secur. 7(3): 242-243 (1988) - Harold Joseph Highland:
Star wars security or where did those micros go? Comput. Secur. 7(3): 243-244 (1988) - Harold Joseph Highland:
Report on the fourth national computer security conference: COMPSEC IV. Comput. Secur. 7(3): 309-311 (1988) - Harold Joseph Highland:
From the editor. Comput. Secur. 7(4): 334 (1988) - Harold Joseph Highland:
How to obtain a computer virus. Comput. Secur. 7(4): 337 (1988) - Harold Joseph Highland:
Are virus attack statistics reliable? Comput. Secur. 7(4): 338 (1988) - Harold Joseph Highland:
From the editor. Comput. Secur. 7(3): 228 (1988) - Yue Jiang Huang, Fred Cohen:
Some weak points of one fast cryptographic checksum algorithm and its improvement. Comput. Secur. 7(5): 503-505 (1988) - Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. Comput. Secur. 7(1): 73-82 (1988) - C. Wayne Madsen:
The world meganetwork and terrorism. Comput. Secur. 7(4): 347-352 (1988) - John McHugh, Bhavani M. Thuraisingham:
Multilevel security issues in distributed database management systems. Comput. Secur. 7(4): 387-396 (1988) - Belden Menkus:
Getting started in data processing disaster recovery. Comput. Secur. 7(1): 47-52 (1988) - Belden Menkus:
Understanding the use of passwords. Comput. Secur. 7(2): 132-136 (1988) - Belden Menkus:
Breakpoints. Comput. Secur. 7(3): 261-268 (1988) - Belden Menkus:
U.S. Government agencies belatedly address information system security issues. Comput. Secur. 7(4): 361-366 (1988) - Belden Menkus:
Understanding password compromise. Comput. Secur. 7(6): 549-552 (1988) - G. Will Milor:
The computer security act of 1987. Comput. Secur. 7(3): 251-253 (1988) - Chris J. Mitchell, Michael Walker:
Solutions to the multidestination secure electronic mail problem. Comput. Secur. 7(5): 483-488 (1988) - William Hugh Murray:
The application of epidemiology to computer viruses. Comput. Secur. 7(2): 139-145 (1988) - Ronald Paans:
The second European conference on computer audit, control and security. Comput. Secur. 7(3): 312-315 (1988) - Charles P. Pfleeger, Shari Lawrence Pfleeger:
A transaction flow approach to software security certification for document handling systems. Comput. Secur. 7(5): 495-502 (1988) - G. M. J. Pluimakers:
Some notes on authorization and transaction management in distributed database systems. Comput. Secur. 7(3): 287-298 (1988) - Arto Salomaa:
A public-key cryptosystem based on language theory. Comput. Secur. 7(1): 83-87 (1988) - Ravinderpal Singh Sandhu:
Nested categories for access control. Comput. Secur. 7(6): 599-605 (1988) - James A. Schweitzer:
Security news briefs. Comput. Secur. 7(5): 467-469 (1988) - Cliff Stoll:
How secure are computers in the U.S.A.?: An analysis of a series of attacks on Milnet computers. Comput. Secur. 7(6): 543-547 (1988) - Detmar W. Straub Jr.:
Organizational structuring of the computer security function. Comput. Secur. 7(2): 185-195 (1988) - Rita C. Summers, Stanley A. Kurzban:
Potential applications of knowledge-based methods to computer security. Comput. Secur. 7(4): 373-385 (1988) - Ian H. Witten, John G. Cleary:
On the privacy afforded by adaptive text compression. Comput. Secur. 7(4): 397-408 (1988)