default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec4.bht:"
@article{DBLP:journals/compsec/Auerbach85, author = {Isaac L. Auerbach}, title = {Professional responsibility for information privacy}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {103--107}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90014-8}, doi = {10.1016/0167-4048(85)90014-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Auerbach85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bruyne85, author = {Pieter de Bruyne}, title = {Signature verification using holistic measures}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {309--315}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90049-5}, doi = {10.1016/0167-4048(85)90049-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bruyne85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarrollI85, author = {John M. Carroll and W. R. Mac Iver}, title = {{COSSAC:} a framework for analyzing and configuring secure computer facilities}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {5--12}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90004-5}, doi = {10.1016/0167-4048(85)90004-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarrollI85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cerullo85, author = {Michael J. Cerullo}, title = {General controls in computer systems}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {33--45}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90007-0}, doi = {10.1016/0167-4048(85)90007-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cerullo85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Chamoux85, author = {Jean{-}Pierre Chamoux}, title = {Data security and confidentiality in Europe}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {207--210}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90029-X}, doi = {10.1016/0167-4048(85)90029-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Chamoux85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen85, author = {Fred Cohen}, title = {A secure computer network design}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {189--205}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90028-8}, doi = {10.1016/0167-4048(85)90028-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Croix85, author = {A. J. du Croix}, title = {Data sharing and access protection in business system 12}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {317--323}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90050-1}, doi = {10.1016/0167-4048(85)90050-1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Croix85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Eck85, author = {Wim van Eck}, title = {Electromagnetic radiation from video display units: An eavesdropping risk?}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {269--286}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90046-X}, doi = {10.1016/0167-4048(85)90046-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Eck85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Eloff85, author = {Jan H. P. Eloff}, title = {The development of a specification language for a computer security system}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {143--147}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90019-7}, doi = {10.1016/0167-4048(85)90019-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Eloff85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalM85, author = {Graham Gal and William E. McCarthy}, title = {Specification of internal accounting controls in a database environment}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {23--32}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90006-9}, doi = {10.1016/0167-4048(85)90006-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85, author = {Harold Joseph Highland}, title = {Editorial}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {1--2}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90002-1}, doi = {10.1016/0167-4048(85)90002-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85a, author = {Harold Joseph Highland}, title = {The first national computer security conference}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {65--73}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90009-4}, doi = {10.1016/0167-4048(85)90009-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85b, author = {Harold Joseph Highland}, title = {Editorial}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {101--102}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90013-6}, doi = {10.1016/0167-4048(85)90013-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85c, author = {Harold Joseph Highland}, title = {Microcomputer security: Data protection techniques}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {123--134}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90016-1}, doi = {10.1016/0167-4048(85)90016-1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland85c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85d, author = {Harold Joseph Highland}, title = {Editorial : Office automation or on the value of being a dinosaur}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {185--186}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90026-4}, doi = {10.1016/0167-4048(85)90026-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85e, author = {Harold Joseph Highland}, title = {{U.S.} computer crime legislation highlighted in special report}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {245--246}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90036-7}, doi = {10.1016/0167-4048(85)90036-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85f, author = {Harold Joseph Highland}, title = {Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, {\textdollar}19.95}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {247}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90037-9}, doi = {10.1016/0167-4048(85)90037-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85g, author = {Harold Joseph Highland}, title = {Managing risk: {A} computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, {\textdollar}18.95}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {247--248}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90038-0}, doi = {10.1016/0167-4048(85)90038-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85h, author = {Harold Joseph Highland}, title = {Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US {\textdollar}46.25}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {249}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90040-9}, doi = {10.1016/0167-4048(85)90040-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85i, author = {Esther Harris Highland}, title = {Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ {US} {\textdollar}28.75}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {249}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90041-0}, doi = {10.1016/0167-4048(85)90041-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85j, author = {Esther Harris Highland}, title = {Proceedings of the seventh computer security group conference : Washington: {US} government printing office, 1984 - 776-101/1027. 115 pages}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {249--250}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90042-2}, doi = {10.1016/0167-4048(85)90042-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland85k, author = {Harold Joseph Highland}, title = {Editorial}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {267--268}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90045-8}, doi = {10.1016/0167-4048(85)90045-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland85k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HovingE85, author = {Per L. Hoving and Johan Ess{\'{e}}n}, title = {Minutes from the first meeting of {TC} 11, security and protection in information processing systems}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {149--152}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90020-3}, doi = {10.1016/0167-4048(85)90020-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HovingE85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus85, author = {Belden Menkus}, title = {The {EDP} auditor's role in computer security}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {135--138}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90017-3}, doi = {10.1016/0167-4048(85)90017-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus85a, author = {Belden Menkus}, title = {The impact of the Bell system breakup on {DP} disaster recovery planning}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {219--222}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90031-8}, doi = {10.1016/0167-4048(85)90031-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Miller85, author = {James E. Miller}, title = {Transaction controls: Steps to take after the equipment has been secured}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {139--141}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90018-5}, doi = {10.1016/0167-4048(85)90018-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Miller85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PieprzykR85, author = {J{\'{o}}zef P. Pieprzyk and Dominik Rutkowski}, title = {Modular design of information encipherment for computer systems}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {211--218}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90030-6}, doi = {10.1016/0167-4048(85)90030-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PieprzykR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PieprzykR85a, author = {J{\'{o}}zef P. Pieprzyk and Dominik Rutkowski}, title = {Design of public key cryptosystems using idempotent elements}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {297--308}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90048-3}, doi = {10.1016/0167-4048(85)90048-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PieprzykR85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schweitzer85, author = {James A. Schweitzer}, title = {A management view: computer security as a discretionary decision}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {13--22}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90005-7}, doi = {10.1016/0167-4048(85)90005-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schweitzer85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Serpell85, author = {Stephen C. Serpell}, title = {Cryptographic equipment security: a code of practice}, journal = {Comput. Secur.}, volume = {4}, number = {1}, pages = {47--64}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90008-2}, doi = {10.1016/0167-4048(85)90008-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Serpell85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VoydockK85, author = {Victor L. Voydock and Stephen T. Kent}, title = {Security mechanisms in a transport layer protocol}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {325--341}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90051-3}, doi = {10.1016/0167-4048(85)90051-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VoydockK85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wong85, author = {Ken Wong}, title = {Computer crime - Risk management and computer security}, journal = {Comput. Secur.}, volume = {4}, number = {4}, pages = {287--295}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90047-1}, doi = {10.1016/0167-4048(85)90047-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wong85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood85, author = {Charles Cresson Wood}, title = {Floppy diskette security measures}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {223--228}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90032-X}, doi = {10.1016/0167-4048(85)90032-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood85a, author = {Charles Cresson Wood}, title = {Security for computer networks : {D.W.} Davies and {W.L.} Price New York: John Wiley and Sons, 1984. 386 + xix pages, {\textdollar}19.50}, journal = {Comput. Secur.}, volume = {4}, number = {3}, pages = {248--249}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90039-2}, doi = {10.1016/0167-4048(85)90039-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Yeo85, author = {Gee Kin Yeo}, title = {Incorporating access control in forms systems}, journal = {Comput. Secur.}, volume = {4}, number = {2}, pages = {109--122}, year = {1985}, url = {https://doi.org/10.1016/0167-4048(85)90015-X}, doi = {10.1016/0167-4048(85)90015-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Yeo85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.