


default search action
Computers & Security, Volume 10
Volume 10, Number 1, February 1991
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 10(1): 4-16 (1991) - Bernard Robertson:

Electronic mail - Is is safe to use? 17-19 - Bill Farquhar:

One approach to risk assessment. 21-23 - Kazue Tanaka, Eiji Okamoto:

Key distribution system for mail systems using ID-related information directory. 25-33 - Chris J. Mitchell

, Vijay Varadharajan:
Modified forms of cipher block chaining. 37-40 - Claude Laferriere:

Predicate based polyinstantiation in multi-level secure DBMS. 41-49 - Vijay Varadharajan, Stewart Black:

Multilevel security in a distributed object-oriented system. 51-68 - J. Carr:

Electronic data interchange - security risk or not? 69-72
Volume 10, Number 2, April 1991
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 10(2): 92-100 (1991) - Karl Rihaczek:

The harmonized ITSEC evaluation criteria. 101-110 - Harold W. Thimbleby:

Can viruses ever be useful? 111-114 - Jim Press:

Secure transfer of identity and privilege attributes in an open systems environment. 117-127 - Jinn-Ke Jan, Chin-Chen Chang, S. J. Wang:

A dynamic key-lock-pair access control scheme. 129-139 - Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas

, J. Keklikoglou:
Data security in medical information systems: The Greek case. 141-159
Volume 10, Number 3, May 1991
- Harold Joseph Highland:

A non-mathematical view of encryption. Comput. Secur. 10(3): 184-188 (1991) - Harold Joseph Highland:

Evaluating an encryption package. Comput. Secur. 10(3): 189-190 (1991) - Harold Joseph Highland:

Computers under attack. Comput. Secur. 10(3): 190-191 (1991) - Harold Joseph Highland:

Microcomputer utilities. Comput. Secur. 10(3): 191-195 (1991) - Harold Joseph Highland:

NTIS volumes of interest. Comput. Secur. 10(3): 195-198 (1991) - Belden Menkus:

How to begin dealing with computer security. 199-203 - Simon Banks:

Understanding IBM's CICS systems to improve security. 205-212 - Stewart Kowalski:

The ABCs and Es of national computer security policies. 213-216 - Stewart Kowalski:

Cybernetic analysis of national computer security. 217-227 - Stewart Kowalski:

Cybernetic analysis of the 12th U.S. National Computer Security Conference. 228-235 - Frederick B. Cohen:

A cost analysis of typical computer viruses and defenses. 239-250 - Ronald Paans, Hans de Lange:

Auditing the SNA/SNI environment. 251-261 - Denis Laurichesse, Laurent Blain:

Optimized implementation of RSA cryptosystem. 263-267 - R. J. Allen:

Trusted ORACLE - multilevel secure data management for military computing. 271-275
Volume 10, Number 4, June 1991
- Belden Menkus:

"Control" is fundamental to successful information security. 293-297 - Andrew Hiles:

Computer fire risks. 299-302 - Jack Bologna:

A framework for the ethical analysis of information technologies. 303-307 - Ronald Paans:

With MVS/ESA security labels towards B1. 309-324 - Paul Evans:

Computer fraud - The situation, detection and training. 325-327 - Gerald V. Post, Karen-Ann Kievit:

Accessibility vs. security: A look at the demand for computer security. 331-344 - Avi Rushinek, Sara F. Rushinek:

Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security. 345-357 - Christof Schramm:

Computing centers undermine MVS security. 359-370
Volume 10, Number 5, August 1991
- Harold Joseph Highland:

Random bits & bytes. 384-397 - Charles Cresson Wood:

Using information security to achieve competitive advantage. 399-404 - Belden Menkus:

"Hackers": Know the adversary. 405-409 - Ravi S. Sandhu, Sushil Jajodia:

Integrity principles and mechanisms in database management systems. 413-427 - Jan Kruys:

Progress in secure distributed systems. 429-441 - G. F. G. O'Shea:

Operating system integrity. 443-465
Volume 10, Number 6, October 1991
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 10(6): 486-495 (1991) - Paul Herbert Rosenthal, Barry Himel:

Business resumption planning: Exercising your emergency response teams. 497-514 - Shari Lawrence Pfleeger:

A framework for security requirements. 515-523 - Charles Cresson Wood:

Burning computer security, privacy, and freedom issues. 524-532 - Frederick B. Cohen:

A note on high-integrity PC bootstrapping. 535-539 - Frederick B. Cohen:

A DOS-based POset implementation. 541-551 - Hannu Nurmi, Arto Salomaa, Lila Santean:

Secret ballot elections in computer networks. 553-560 - S. Peach:

Disaster recovery: An unnecessary cost burden or an essential feature of any DP installation? 565-568
Volume 10, Number 7, November 1991
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 10(7): 586-600 (1991) - Sanford Sherizen:

European unification '92 impacts on information security. 601-610 - Gerhard Steinke:

Design aspects of access control in a knowledge base system. 612-625 - Viiveke Fåk:

Computer verification of human users' identity: A theoretical model and some evaluation criteria. 626-636 - Josep Domingo-Ferrer:

Algorithm- sequenced access control. 639-652 - Dalenca Pottas

, Sebastiaan H. von Solms:
A computerized management reporting aid for a mainframe security system. 653-660 - M. L. Goyal, G. V. Singh:

Access control in distributed heterogeneous database management systems. 661-669
Volume 10, Number 8, December 1991
- Harold Joseph Highland:

Random bits & bytes. 690-699 - Charles Preston:

Creating a corporate virus plan. 701-710 - Paul Lynch:

Beyond RACF: Extending user authentication controls. 711-722 - Bhavani Thuraisingham:

Multilevel security issues in distributed database management systems II. 727-747 - Richard L. Baskerville

:
Risk analysis as a source of professional knowledge. 749-764 - Gnanesh Coomaraswamy, Srikanta P. R. Kumar, Michel E. Marhic:

Fiber-optic LAN/WAN systems to support confidential communication. 765-776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














