


default search action
Computers & Security, Volume 11
Volume 11, Number 1, March 1992
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 11(1): 4-15 (1992) - Belden Menkus:

A high rise building fire case study. 19-23 - Robin L. Sherman:

Distributed systems security. 24-28 - Bernard P. Zajac Jr.:

Computer viral risks - how bad is the threat? 29-34 - Teresa F. Lunt:

Security in database systems: A research perspective. 41-56 - Atika Laribi, Dennis G. Kafura:

A protection model incorporating both authorization and constraints. 57-73 - Dennis Longley, S. Rigby:

An automatic search for security flaws in key management schemes. 75-89
Volume 11, Number 2, April 1992
- Harold Joseph Highland:

Random bits & bytes. 110-120 - Belden Menkus:

Introduction to computer security. 121-127 - Robin L. Sherman:

Biometrics futures. 128-133 - Dimitris Gritzalis, Sokratis K. Katsikas

, J. Keklikoglou, A. Tomaras:
Determining access rights for medical information systems. 149-161 - P. Venkat Rangan:

An axiomatic theory of trust in secure communication protocols. 163-172 - Rotraut Laun:

Asymmetric user authentication. 173-183
Volume 11, Number 3, May 1992
- Harold Joseph Highland:

Random bits & bytes. 200-209 - Belden Menkus:

Concerns in computer security. 211-215 - Bernard P. Zajac Jr.:

Cost-effectiveness of anti-viral software. 217-226 - Harold Joseph Highland:

The security impact of networks, telecommunications, and office automation. 227-232 - Wayne Madsen:

Government-sponsored computer warfare and sabotage. 233-236 - Ian G. Graham, St. H. Wieten:

The PC as a secure network workstation. 237-244 - George I. Davida, Yvo Desmedt:

Passports and visas versus IDs. 253-258 - Martin S. Olivier

, Sebastiaan H. von Solms:
Building a secure database using self-protecting objects. 259-271 - Eugene H. Spafford:

OPUS: Preventing weak password choices. 273-278
Volume 11, Number 4, July 1992
- Harold Joseph Highland:

Random bits & bytes. 294-306 - Rob Dixon, Claire Marston, Paul A. Collier:

A report on the joint CIMA and IIA computer fraud survey. 307-313 - T. P. de Vries:

The implementation of TSS. 315-325 - Information security administration model: A management model to help identify the best practices of the administration function within the security group. 327-340

- Gunar E. Liepins, H. S. Vaccaro:

Intrusion detection: Its role and validation. 347-355 - Jie Wu, Eduardo B. Fernández

, Ruiguang Zhang:
Some extensions to the lattice model for computer security. 357-369
Volume 11, Number 5, September 1992
- Harold Joseph Highland:

Random bits & bytes. 390-406 - L. G. Lawrence:

RACIF security goals comment on a paper by R. Paans. 407-411 - Geoff Norman:

PC security issues. 412-416 - Belden Menkus:

The lessons of the Great Chicago flood of 1992. 417-420 - David L. Lathrop:

Security aspects of wireless local area networks. 421-426 - Fritz Bauspieß, Frank Damm:

Requirements for cryptographic hash functions. 427-437 - Helen A. Bergen, James M. Hogan:

Data security in a fixed-model arithmetic coding compression algorithm. 445-461 - William J. Caelli, Anthony W. Rhodes, Nick C. Russell:

An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. 463-479
Volume 11, Number 6, October 1992
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 11(6): 498-507 (1992) - Françoise Gilbert:

Breach of system security and theft of data: Legal aspects and preventive measures. 508-517 - John Robinson:

Computer security evaluation: Developments in the European ITSEC programme. 518-524 - Belden Menkus:

Understanding EDI security issues. 525-528 - Ravi S. Sandhu, Sushil Jajodia:

Eliminating polyinstantiation securely. 547-562 - Frederick B. Cohen:

Defense-in-depth against computer viruses. 563-579 - Sebastiaan H. von Solms, David Naccache:

On blind signatures and perfect crimes. 581-583
Volume 11, Number 7, November 1992
- Harold Joseph Highland:

Random bits & bytes. 592-601 - Alan Solomon:

The virus authors strike back. 602-606 - Jon David:

LAN security standards. 607-619 - Michael J. Cerullo, R. Steve McDuffie:

Computer contingency plans and the auditors: A survey of businesses affected by Hurricane Hugo. 620-622 - Frederick B. Cohen:

A formal definition of computer worms and some related results. 641-652 - Sead Muftic, Edina Hatunic:

CISS: Generalized security libraries. 653-659 - Bhavani Thuraisingham, Harvey H. Rubinovitz:

Multilevel security issues in distributed database management systems - III. 661-674
Volume 11, Number 8, December 1992
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 11(8): 682-694 (1992) - Todd Whiting:

Understanding VAX/VMS security. Comput. Secur. 11(8): 695-698 (1992) - George Black:

Update on open systems security. Comput. Secur. 11(8): 699-702 (1992) - Belden Menkus:

Re-examining the Data Encryption Standard. Comput. Secur. 11(8): 703-706 (1992) - Judith King:

X.400 security. Comput. Secur. 11(8): 707-710 (1992) - Gary Hardy:

Case study: Closing 'windows' against intruders. Comput. Secur. 11(8): 711-714 (1992) - Dimitris Gritzalis, Sokratis K. Katsikas

, Stefanos Gritzalis
:
A zero knowledge probabilistic login protocol. 733-745 - Lein Harn, Hung-Yu Lin, Shoubao Yang:

A software authentication system for information integrity. 747-752 - Ravi S. Sandhu:

Lattice-based enforcement of Chinese Walls. 753-763

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














