


default search action
Computers & Security, Volume 3
Volume 3, Number 1, February 1984
- Rolf Moulton:

Data security is a management responsibility. 3-7 - Harvey S. Koch:

Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation. 9-19 - James A. Schweitzer:

Personal workstation automation security vulnerabilities. 21-28 - Ruth A. Seif:

Contingency planning in the banking community. 29-34 - Arthur E. Oldehoeft, Robert McDonald:

A software scheme for user-controlled file encryption. 35-41 - Sig Porter:

Cryptology and number sequences: Pseudorandom, random, and perfectly random. 43-44 - Albert A. Mullin:

A note on the mathematics of public-key cryptosystems. 45-47 - Michael Comer:

Computer crime needs international countermeasures. 53-55
Volume 3, Number 2, May 1984
- Harold Joseph Highland:

Editorial. 77-79 - Donn B. Parker:

Safeguards selection principles. 81-91 - Rolf T. Moulton:

A practical approach to system security devices. 93-99 - Arthur Sorkin, C. James Buchanan:

Measurement of cryptographic capability protection algorithms. 101-116 - Ilias Kaperonis:

Industrial espionage. 117-121 - Morrison Bump Jr.:

A primer on software piracy cases in the courts. 123-134 - Charles Cresson Wood:

Securicom '84. 140-142
Volume 3, Number 3, August 1984
- Harold Joseph Highland:

Editorial. 169-170 - Bram van den Berg, Hans Leenaars:

Advanced topics of a computer center audit. 171-185 - Ben F. Barton, Marthalee S. Barton:

User-friendly password methods for computer-mediated information systems. 186-195 - Mariagrazia Fugini

, Giancarlo Martella:
ACTEN: A conceptual model for security systems design. 196-214 - Chadwick H. Nestman, John C. Windsor, Mary C. Hinson:

Tutorial on telecommunications and security. 215-224 - Richard I. Polis:

Information security: Reality and fiction. 225-228 - Warren W. Fisher:

Cryptography for computer security: Making the decision. 229-233 - Lothar Krause:

Data encryption in ISO, the International Organization for Standardization. 234-236
Volume 3, Number 4, November 1984
- Harold Joseph Highland:

Editorial. 257 - Ronald Paans:

Computer security and EDP-auditing: The twin guards. 259-261 - I. S. Herschberg, Ronald Paans:

The programmer's threat: Cases and causes. 263-272 - F. Buurmeijer:

IBM's data security strategy: Some implementation aspects. 273-277 - Ronald Paans, I. S. Herschberg:

A topology for secure MVS systems. 278-285 - C. P. Louwerse, J. M. L. Kouwenberg:

Data protection aspects in an integrated hospital information system. 286-294 - W. R. C. van Hoboken:

The burglar's viewpoint. 295-302 - R. Toppen:

Infinite confidence: 'The audit of data communication networks'. 303-313 - Ad J. van de Goor:

Effects of technical developments on system security. 314-322 - Ronald Paans:

ECOMA-12 European computer measurement association conference : Special interest group on performance aspects of computer security. 323-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














