export record
dblp key:
journals/compsec/Kowalski91b share record
persistent URL:
Stewart Kowalski : Cybernetic analysis of the 12th U.S. National Computer Security Conference. Comput. Secur. 10 (3 ) : 228-235 (1991 )share record
persistent URL:
Jan Kruys : Progress in secure distributed systems. Comput. Secur. 10 (5 ) : 429-441 (1991 )export record
dblp key:
journals/compsec/Laferriere91 share record
persistent URL:
Claude Laferriere : Predicate based polyinstantiation in multi-level secure DBMS. Comput. Secur. 10 (1 ) : 41-49 (1991 )export record
dblp key:
journals/compsec/LaurichesseB91 share record
persistent URL:
Denis Laurichesse , Laurent Blain : Optimized implementation of RSA cryptosystem. Comput. Secur. 10 (3 ) : 263-267 (1991 )share record
persistent URL:
Paul Lynch : Beyond RACF: Extending user authentication controls. Comput. Secur. 10 (8 ) : 711-722 (1991 )export record
dblp key:
journals/compsec/Menkus91 share record
persistent URL:
Belden Menkus : How to begin dealing with computer security. Comput. Secur. 10 (3 ) : 199-203 (1991 )export record
dblp key:
journals/compsec/Menkus91a share record
persistent URL:
Belden Menkus : "Control" is fundamental to successful information security. Comput. Secur. 10 (4 ) : 293-297 (1991 )export record
dblp key:
journals/compsec/Menkus91b share record
persistent URL:
Belden Menkus : "Hackers": Know the adversary. Comput. Secur. 10 (5 ) : 405-409 (1991 )export record
dblp key:
journals/compsec/MitchellV91 share record
persistent URL:
Chris J. Mitchell , Vijay Varadharajan : Modified forms of cipher block chaining. Comput. Secur. 10 (1 ) : 37-40 (1991 )export record
dblp key:
journals/compsec/NurmiSS91 share record
persistent URL:
Hannu Nurmi , Arto Salomaa , Lila Santean : Secret ballot elections in computer networks. Comput. Secur. 10 (6 ) : 553-560 (1991 )share record
persistent URL:
G. F. G. O'Shea : Operating system integrity. Comput. Secur. 10 (5 ) : 443-465 (1991 )share record
persistent URL:
Ronald Paans : With MVS/ESA security labels towards B1. Comput. Secur. 10 (4 ) : 309-324 (1991 )export record
dblp key:
journals/compsec/PaansL91 share record
persistent URL:
Ronald Paans , Hans de Lange : Auditing the SNA/SNI environment. Comput. Secur. 10 (3 ) : 251-261 (1991 )share record
persistent URL:
S. Peach : Disaster recovery: An unnecessary cost burden or an essential feature of any DP installation? Comput. Secur. 10 (6 ) : 565-568 (1991 )export record
dblp key:
journals/compsec/Pfleeger91 share record
persistent URL:
Shari Lawrence Pfleeger : A framework for security requirements. Comput. Secur. 10 (6 ) : 515-523 (1991 )share record
persistent URL:
Gerald V. Post , Karen-Ann Kievit : Accessibility vs. security: A look at the demand for computer security. Comput. Secur. 10 (4 ) : 331-344 (1991 )export record
dblp key:
journals/compsec/PottasS91 share record
persistent URL:
Dalenca Pottas , Sebastiaan H. von Solms : A computerized management reporting aid for a mainframe security system. Comput. Secur. 10 (7 ) : 653-660 (1991 )share record
persistent URL:
Jim Press : Secure transfer of identity and privilege attributes in an open systems environment. Comput. Secur. 10 (2 ) : 117-127 (1991 )export record
dblp key:
journals/compsec/Preston91 share record
persistent URL:
Charles Preston : Creating a corporate virus plan. Comput. Secur. 10 (8 ) : 701-710 (1991 )export record
dblp key:
journals/compsec/Rihaczek91 share record
persistent URL:
Karl Rihaczek : The harmonized ITSEC evaluation criteria. Comput. Secur. 10 (2 ) : 101-110 (1991 )export record
dblp key:
journals/compsec/Robertson91 share record
persistent URL:
Bernard Robertson : Electronic mail - Is is safe to use? Comput. Secur. 10 (1 ) : 17-19 (1991 )export record
dblp key:
journals/compsec/RosenthalH91 share record
persistent URL:
Paul Herbert Rosenthal , Barry Himel : Business resumption planning: Exercising your emergency response teams. Comput. Secur. 10 (6 ) : 497-514 (1991 )export record
dblp key:
journals/compsec/RushinekR91 share record
persistent URL:
Avi Rushinek , Sara F. Rushinek : Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security. Comput. Secur. 10 (4 ) : 345-357 (1991 )export record
dblp key:
journals/compsec/SandhuJ91 share record
persistent URL:
Ravi S. Sandhu , Sushil Jajodia : Integrity principles and mechanisms in database management systems. Comput. Secur. 10 (5 ) : 413-427 (1991 )export record
dblp key:
journals/compsec/Schramm91 share record
persistent URL:
Christof Schramm : Computing centers undermine MVS security. Comput. Secur. 10 (4 ) : 359-370 (1991 )export record
dblp key:
journals/compsec/Sherizen91 share record
persistent URL:
Sanford Sherizen : European unification '92 impacts on information security. Comput. Secur. 10 (7 ) : 601-610 (1991 )export record
dblp key:
journals/compsec/Steinke91 share record
persistent URL:
Gerhard Steinke : Design aspects of access control in a knowledge base system. Comput. Secur. 10 (7 ) : 612-625 (1991 )export record
dblp key:
journals/compsec/TanakaO91 share record
persistent URL:
Kazue Tanaka , Eiji Okamoto : Key distribution system for mail systems using ID-related information directory. Comput. Secur. 10 (1 ) : 25-33 (1991 )export record
dblp key:
journals/compsec/Thimbleby91 share record
persistent URL:
Harold W. Thimbleby : Can viruses ever be useful? Comput. Secur. 10 (2 ) : 111-114 (1991 )export record
dblp key:
journals/compsec/Thuraisingham91 share record
persistent URL:
Bhavani Thuraisingham : Multilevel security issues in distributed database management systems II. Comput. Secur. 10 (8 ) : 727-747 (1991 )