


default search action
Computers & Security, Volume 6
Volume 6, Number 1, February 1987
- Harold Joseph Highland:

In this issue... 1-3 - Harold Joseph Highland:

Computer viruses and sudden death! 8-10 - Rolf T. Moulton:

How to supervise and control I/S Security Officers and Auditors. 17-21 - Fred Cohen:

Computer viruses: Theory and experiments. 22-35 - Viiveke Fåk:

Crypto management made manageable - Demands on crypto equipment design. 36-40 - June M. Power, Steve R. Wilbur:

Authentication in a heterogeneous environment. 41-48 - Artur Solarz:

Computer-related embezzlement. 49-53 - Dennis Longley:

Expert systems applied to the analysis of key management schemes. 54-67 - Peter P. C. H. Kingston, Martin Goulbourn:

Security for microcomputers used in small business. 68-72 - Harold Joseph Highland:

Data physician - A virus protection program. 73-79
Volume 6, Number 2, April 1987
- Harold Joseph Highland:

In this issue... 97-98 - Harold Joseph Highland:

How secure are your encryption keys? 99-100 - Harold Joseph Highland:

The DES revisited - Part II. 100-101 - Harold Joseph Highland:

Computer security: A new focus at the National Bureau of Standards. 102-103 - Harold Joseph Highland:

Technology watch. 103-108 - Harold Joseph Highland:

The charade of computer security. 108-109 - Harold Joseph Highland:

Random notes and reports. 109-110 - Juhani Saari:

Computer crime - numbers lie. 111-117 - Fred Cohen:

Protection and administration of information networks with partial orderings. 118-128 - James A. Schweitzer:

How security fits in - a management view: Security is an essential for quality information. 129-132 - I. S. Herschberg:

The hackers' comfort. 133-138 - Tung Bui, Taracad R. Sivasankaran:

Cost-effectiveness modeling for a decision support system in computer security. 139-151 - Niv Ahituv, Yeheskel Lapid, Seev Neumann:

Verifying the authentication of an information system user. 152-157 - Andreas Pfitzmann, Michael Waidner

:
Networks without user observability. 158-166 - Ronald Paans:

IFIP/Sec'86: Information security: The challenge. 167-171 - Ronald Paans:

ECOMA-14. 172 - Ronald Paans:

First European Conference on Computer Audit, Control & Security. 173-176 - J. A. N. Lee, Gerald Segal:

Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking. 177-179
Volume 6, Number 3, June 1987
- Harold Joseph Highland:

From the editor. 193-194 - Harold Joseph Highland:

Data encryption standard II? 195-196 - Harold Joseph Highland:

Report from Beijing. 196-198 - Harold Joseph Highland:

Information sources. 198-199 - Harold Joseph Highland:

Encryption package. 199-202 - Harold Joseph Highland:

US data controls. 202-203 - Harold Joseph Highland:

Computer security and law. 203-205 - Harold Joseph Highland:

Cipher cracking. 205 - Karl Rihaczek:

TeleTrusT-OSIS and communication security. 206-218 - Fred Cohen:

Design and administration of distributed and hierarchical information networks under partial orderings. 219-228 - Harold Joseph Highland:

How to evaluate microcomputer encryption software and hardware. 229-244 - Patricia A. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham:

Multilevel Security in Database Management Systems. 245-251 - Richard J. Johnstone:

Key updating flags in EFT-POS security systems. 252-260 - Philippe van Heurck:

TRASEC: Belgian security system for electronic funds transfers. 261-268
Volume 6, Number 4, August 1987
- Harold Joseph Highland:

From the editor... 285-287 - Harold Joseph Highland:

Would you report a suspected data crime to the authorities? 288-295 - John M. Carroll:

Strategies for extending the useful lifetime of DES. 300-313 - Charles Cresson Wood:

Information systems security: Management success factors. 314-320 - Maria M. Pozzo, Terence E. Gray:

An approach to containing computer viruses. 321-331 - Fred Cohen:

Design and protection of an information network under a partial ordering: A case study. 332-338 - Chris J. Mitchell

, Fred Piper:
The cost of reducing key-storage requirements in secure networks. 339-341 - Achim Jung:

Implementing the RSA cryptosystem. 342-350 - Viiveke Fåk:

Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4. 351
Volume 6, Number 5, October 1987
- Harold Joseph Highland:

From the editor. 365-367 - Harold Joseph Highland:

Secure fax transmission. 368-370 - J.-C. Spender:

Identifying computer users with authentication devices (tokens). 385-395 - C. Fernández, A. Vaquero, José M. Troya, J. M. Sánchez:

Automating the computation of authenticators for interbank telex messages. 396-402 - Ronald Paans, I. S. Herschberg:

Computer security: The long road ahead. 403-416 - Gerald V. Post:

Improving operating system security. 417-425
Volume 6, Number 6, December 1987
- Harold Joseph Highland:

From the editor. 445-446 - Harold Joseph Highland:

New member of the International Board of Editors. 447 - Harold Joseph Highland:

Computer abuse and managerial response. 448 - Harold Joseph Highland:

Data cartridge for secure data. 449-451 - Harold Joseph Highland:

Passwords revisited. 451-452 - Harold Joseph Highland:

Office automation security. 452-457 - Harold Joseph Highland:

Tempest over leaking computers. 457-458 - Harold Joseph Highland:

Hard disk recovery tools. 458-462 - Harold Joseph Highland:

Random notes. 463 - Sidney L. Smith:

Authenticating users by word association. 464-470 - Bruce J. Baird, Lindsay L. Baird Jr., Ronald P. Ranauro:

The moral cracker? 471-478 - Bhavani M. Thuraisingham:

Security checking in relational database management systems augmented with inference engines. 479-492 - Sergio B. Guarro:

Principles and procedures of the LRAM approach to information systems risk analysis and management. 493-504 - Fred Cohen:

A cryptographic checksum for integrity protection. 505-510 - Charles Cresson Wood:

The human immune system as an information systems security reference model. 511-516

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














