


default search action
Computers & Security, Volume 12
Volume 12, Number 1, February 1993
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 12(1): 4-14 (1993) - L. G. Lawrence:

The role of roles. 15-21 - Joseph M. Pujals:

Security and privacy. 22-27 - Steve Donovan:

Security of PCs in a distributed environment. 28-31 - Charles Cresson Wood, William W. Banks Jr.:

Human error: an overlooked but significant information security problem. 51-60 - Thomas A. Longstaff, E. Eugene Schultz:

Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. 61-77 - Rayford B. Vaughn, Hossein Saiedian

, Elizabeth A. Unger:
A survey of security issues in office computation and the application of secure computing models to office systems. 79-97
Volume 12, Number 2, March 1993
- Harold Joseph Highland:

Random bits & bytes. 106-116 - Stanley H. Stahl:

Information security in workstation environments. 117-122 - Robert A. Clyde:

DECnet security (Not necessarily an oxymoron). 123-127 - David Moseley:

Public key management for X.25 network security. 128-133 - Helen A. Bergen, James M. Hogan:

A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. 157-167 - John A. Fitch III, Lance J. Hoffman:

A shortest path network security model. 169-189 - Mary C. Jones, Kirk P. Arnett, Jeung-tai Eddie Tang, Nian-Shin Chen:

Perceptions of computer viruses: a cross-cultural assessment. 191-197
Volume 12, Number 3, May 1993
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 12(3): 216-224 (1993) - Geoff Norman:

Disaster recovery after downsizing. 225-229 - L. G. Lawrence:

Digital signatures - Explanation and usage. 230-233 - Judith Hochberg, Kathleen A. Jackson, Cathy A. Stallings, J. F. McClary, David H. DuBois, Josephine Ford:

NADIR: An automated system for detecting network intrusion and misuse. 235-248 - Harold Joseph Highland:

Conference report. 249-253 - Jeffrey M. Voas, Jeffery E. Payne, Frederick B. Cohen:

A model for detecting the existence of software corruption in real time. 275-283 - Ravi S. Sandhu, Gurpreet S. Suri:

A distributed capability-based architecture for the transform model. 285-303 - P. Venkat Rangan:

The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol. 305-314
Volume 12, Number 4, June 1993
- Edwin B. Heinlein:

Recovery management. Comput. Secur. 12(4): 334-337 (1993) - John Meyer:

The 1993 IFIP Kristian Beckman Award. Comput. Secur. 12(4): 338-340 (1993) - Manfred Reitenspieß:

Open system security standards. Comput. Secur. 12(4): 341-361 (1993) - Christof Schramm:

Added-on security for MVS: weaknesses and measures. 379-388 - James M. Slack, Elizabeth A. Unger:

Integrity in object-oriented database systems. 389-404 - Teresa F. Lunt:

A survey of intrusion detection techniques. 405-418
Volume 12, Number 5, August 1993
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 12(5): 424-433 (1993) - Edwin B. Heinlein:

World Trade Center - A retrospective. 435-436 - David K. Black:

The Digital Signature Standard: Overview and current status. 437-446 - Barbara B. Di Turi:

Security for EDIFACT messages. 447-455 - Frans Labuschagne, Jan Roos:

Data security in X.25 networks. 469-475 - Andreas Pfitzmann, Ralf Aßmann:

More efficient software implementations of (generalized) DES. 477-500 - J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda:

Encryption and error correction codes for reliable file storage. 501-510
Volume 12, Number 6, October 1993
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 12(6): 518-526 (1993) - Charles Cresson Wood:

Duress terminations and information security. 527-535 - Michael F. Kensey:

Computer viruses - Towards better solutions. 536-541 - Selwyn Russell:

Paradigms for verification of authorization at source of electronic documents in an integrated environment. 542-549 - Harold Joseph Highland:

IFIP/Sec '93 conference report. 550-555 - Frederick B. Cohen:

Operating system protection through program evolution. 565-584 - Eugene H. Spafford, Stephen A. Weeber:

Software forensics: Can we track code to its authors? 585-595 - Jan H. P. Eloff, Les Labuschagne

, Karin P. Badenhorst:
A comparative framework for risk analysis methods. 597-603
Volume 12, Number 7, November 1993
- Harold Joseph Highland:

Random bits & bytes. Comput. Secur. 12(7): 612-622 (1993) - Martin Plant:

Getting management buy-in to IT security. 623-626 - Edwin B. Heinlein:

I worked with Murphy. 627-628 - Brian S. Collins

, Steve Mathews:
Securing your business process. 629-633 - Harold Joseph Highland:

A view of information security tomorrow. 634-639 - William J. Caelli, Ian G. Graham, Luke O'Connor:

Cryptographic Application Programming Interfaces (APIs). 640-645 - Mohammad S. Obaidat

:
A methodology for improving computer access security. 657-662 - Charles Cresson Wood:

Principles of secure information systems design with groupware examples. 663-678 - Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams:

Report of an integrity research study group. 679-689
Volume 12, Number 8, December 1993
- Harold Joseph Highland:

Random bits & bytes. 698-709 - Peter Fagan:

Organizational issues in IT security. 710-715 - Gary Hardy:

Commercial accreditation of information security. 716-729 - Harold Joseph Highland:

16th national computer security conference. 730-734 - Dieter Gollmann, Thomas Beth, Frank Damm:

Authentication services in distributed systems. 753-764 - Jon Ølnes:

EDIFACT security made simple - the EDIMED approach. 765-774 - Frank Koerner:

System threats and vulnerabilities and the contrary principle. 775-779 - Caroline Allinson, Helen Bergen, Ed Dawson

:
Message collision in block ciphers with message authentication. 781-787

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














