default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec9.bht:"
@article{DBLP:journals/compsec/Al-Dossary90, author = {Ghannam M. Al{-}Dossary}, title = {Computer virus prevention and containment on mainframes}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {131--137}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90085-8}, doi = {10.1016/0167-4048(90)90085-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-Dossary90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BadenhorstE90, author = {Karin P. Badenhorst and Jan H. P. Eloff}, title = {Computer security methodology: Risk analysis and project definition}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {339--346}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90104-2}, doi = {10.1016/0167-4048(90)90104-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BadenhorstE90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Banks90, author = {Simon Banks}, title = {Security policy}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {605--610}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90058-2}, doi = {10.1016/0167-4048(90)90058-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Banks90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna90, author = {Jack Bologna}, title = {Ethical issues of the information era}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {689--692}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90110-F}, doi = {10.1016/0167-4048(90)90110-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurkP90, author = {Holger B{\"{u}}rk and Andreas Pfitzmann}, title = {Value exchange systems enabling security and unobservability}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {715--721}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90114-9}, doi = {10.1016/0167-4048(90)90114-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurkP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurnsM90, author = {John Burns and Chris J. Mitchell}, title = {A security scheme for resource sharing over a network}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {67--75}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90159-Q}, doi = {10.1016/0167-4048(90)90159-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurnsM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Candia90, author = {Tanya Candia}, title = {How {VMS} keeps out intruders}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {499--502}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90125-D}, doi = {10.1016/0167-4048(90)90125-D}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Candia90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Carrol90, author = {John M. Carroll}, title = {Conference report: 2300 brave virus threat to attend national security conference}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {45--49}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90155-M}, doi = {10.1016/0167-4048(90)90155-M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Carrol90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Carroll90, author = {John M. Carroll}, title = {Security and credibility in an information-intensive society}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {489--498}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90124-C}, doi = {10.1016/0167-4048(90)90124-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Carroll90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Carroll90a, author = {John M. Carroll}, title = {"Do-it-yourself" cryptography}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {613--619}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90060-7}, doi = {10.1016/0167-4048(90)90060-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Carroll90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cole90, author = {Robert Cole}, title = {A model for security in distributed systems}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {319--330}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90102-Y}, doi = {10.1016/0167-4048(90)90102-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cole90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/David90, author = {Jon David}, title = {The numbers game}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {403--407}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90070-A}, doi = {10.1016/0167-4048(90)90070-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/David90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/David90a, author = {Jon David}, title = {The Novell virus}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {593--599}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90056-Y}, doi = {10.1016/0167-4048(90)90056-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/David90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Domingo-FerrerR90, author = {Josep Domingo{-}Ferrer and Lloren{\c{c}} Huguet i Rotger}, title = {Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {145--152}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90088-B}, doi = {10.1016/0167-4048(90)90088-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Domingo-FerrerR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Evans90, author = {Paul Evans}, title = {How can professional standards be set and maintained?}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {313--316}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90100-8}, doi = {10.1016/0167-4048(90)90100-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Evans90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EvansM90, author = {Paul Evans and Tina Monk}, title = {Conference report: {COMPSEC} '89}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {41--44}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90154-L}, doi = {10.1016/0167-4048(90)90154-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EvansM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gliss90, author = {Hans Gliss}, title = {East Germany - haven for software piracy}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {391--393}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90068-5}, doi = {10.1016/0167-4048(90)90068-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gliss90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarnL90, author = {Lein Harn and Hung{-}Yu Lin}, title = {A cryptographic key generation scheme for multilevel data security}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {539--546}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90132-D}, doi = {10.1016/0167-4048(90)90132-D}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarnL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HerschbergP90, author = {I. S. Herschberg and Ronald Paans}, title = {Friday the 13th, facts and fancies}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {125--130}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90084-7}, doi = {10.1016/0167-4048(90)90084-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HerschbergP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HerschbergP90a, author = {I. S. Herschberg and Ronald Paans}, title = {Sloppy, sloppier, sloppiest}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {223--228}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90167-R}, doi = {10.1016/0167-4048(90)90167-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HerschbergP90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {4--11}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90149-N}, doi = {10.1016/0167-4048(90)90149-N}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90a, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {102--109}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90081-4}, doi = {10.1016/0167-4048(90)90081-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90b, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {196--208}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90164-O}, doi = {10.1016/0167-4048(90)90164-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90c, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {282--294}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90095-B}, doi = {10.1016/0167-4048(90)90095-B}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90d, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {366--378}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90066-3}, doi = {10.1016/0167-4048(90)90066-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90e, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {470--482}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90122-A}, doi = {10.1016/0167-4048(90)90122-A}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90f, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {570--586}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90054-W}, doi = {10.1016/0167-4048(90)90054-W}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland90g, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {660--675}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90108-6}, doi = {10.1016/0167-4048(90)90108-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland90g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Homer90, author = {Steven Homer}, title = {Setting standards in Europe}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {295--300}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90096-C}, doi = {10.1016/0167-4048(90)90096-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Homer90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Jackson90, author = {Keith Jackson}, title = {Confessions of a security consultant}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {509--511}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90127-F}, doi = {10.1016/0167-4048(90)90127-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Jackson90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JonesW90, author = {Scott K. Jones and Clinton E. White Jr.}, title = {The {IPM} model of computer virus management}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {411--417}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90072-2}, doi = {10.1016/0167-4048(90)90072-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JonesW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Klopp90, author = {Charlotte Klopp}, title = {Software vendors capitalize on security needs}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {33--35}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90152-J}, doi = {10.1016/0167-4048(90)90152-J}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Klopp90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Klopp90a, author = {Charlotte Klopp}, title = {Microcomputer security systems attempt to lock up desktops}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {139--141}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90086-9}, doi = {10.1016/0167-4048(90)90086-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Klopp90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Klopp90b, author = {Charlotte Klopp}, title = {More options for physical access control}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {229--232}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90168-S}, doi = {10.1016/0167-4048(90)90168-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Klopp90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Klopp90c, author = {Charlotte Klopp}, title = {Vulnerability awareness improves contingency planning}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {309--311}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90099-F}, doi = {10.1016/0167-4048(90)90099-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Klopp90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Laferriere90, author = {Claude Laferriere}, title = {A discussion of implementation strategies for secure database management systems}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {235--244}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90170-X}, doi = {10.1016/0167-4048(90)90170-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Laferriere90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaferriereHB90, author = {Claude Laferriere and G. Owen Higginson and Gordon G. Bell}, title = {Security architectures for textual databases}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {621--630}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90061-W}, doi = {10.1016/0167-4048(90)90061-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaferriereHB90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lathrop90, author = {David L. Lathrop}, title = {Perestroika and its implications for computer security in the {U.S.S.R}}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {693--696}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90111-6}, doi = {10.1016/0167-4048(90)90111-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lathrop90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lloyd90, author = {Ivor Lloyd}, title = {Software evaluation in high integrity systems}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {419--429}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90073-3}, doi = {10.1016/0167-4048(90)90073-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lloyd90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McKoskyS90, author = {Robert A. McKosky and Sajjan G. Shiva}, title = {A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {431--446}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90074-4}, doi = {10.1016/0167-4048(90)90074-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McKoskyS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus90, author = {Belden Menkus}, title = {How an "audit trail" aids in maintaining information integrity...as illustrated in retailing}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {111--116}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90082-5}, doi = {10.1016/0167-4048(90)90082-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus90a, author = {Belden Menkus}, title = {Understanding data communication security vulnerabilities}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {209--213}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90165-P}, doi = {10.1016/0167-4048(90)90165-P}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus90b, author = {Belden Menkus}, title = {Why data communications are insecure}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {483--487}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90123-B}, doi = {10.1016/0167-4048(90)90123-B}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus90c, author = {Belden Menkus}, title = {The complexity of "long haul" data communication security}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {587--592}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90055-X}, doi = {10.1016/0167-4048(90)90055-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mercer90, author = {Lindsay C. J. Mercer}, title = {Tailor-made auditing of information systems for the detection of fraud}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {59--66}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90158-P}, doi = {10.1016/0167-4048(90)90158-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mercer90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mercer90a, author = {Lindsay C. J. Mercer}, title = {Fraud detection via regression analysis}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {331--338}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90103-Z}, doi = {10.1016/0167-4048(90)90103-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mercer90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Muftic90, author = {Sead Muftic}, title = {Transaction protection by "antennas"}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {245--255}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90171-O}, doi = {10.1016/0167-4048(90)90171-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Muftic90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OlsonA90, author = {Ingrid M. Olson and Marshall D. Abrams}, title = {Computer access control policy choices}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {699--714}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90113-8}, doi = {10.1016/0167-4048(90)90113-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OlsonA90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PaansH90, author = {Ronald Paans and I. S. Herschberg}, title = {Auditing the change management process}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {161--174}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90090-G}, doi = {10.1016/0167-4048(90)90090-G}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PaansH90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Parker90, author = {T. A. Parker}, title = {Application access control standards for distributed systems}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {519--528}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90130-L}, doi = {10.1016/0167-4048(90)90130-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Parker90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PreneelBGV90, author = {Bart Preneel and Antoon Bosselaers and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Cryptanalysis of a fast cryptographic checksum algorithm}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {257--262}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90172-P}, doi = {10.1016/0167-4048(90)90172-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PreneelBGV90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ramaswamy90, author = {Raju Ramaswamy}, title = {A key management algorithm for secure communication in open systems interconnection architecture}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {77--84}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90160-U}, doi = {10.1016/0167-4048(90)90160-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ramaswamy90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchellB90, author = {Roger R. Schell and David Bailey}, title = {Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, {DATAKONTEXT-VERLAG} Gmbh, Postfach 400253, {D-5000} Koln 40, F.R.G., {ISBN} 3-89209-000-9, 1989}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {459--460}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90077-7}, doi = {10.1016/0167-4048(90)90077-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchellB90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShepherdSP90, author = {Simon J. Shepherd and Peter W. Sanders and A. Patel}, title = {A comprehensive security system - the concepts, agents and protocols}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {631--643}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90062-X}, doi = {10.1016/0167-4048(90)90062-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShepherdSP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sherizen90, author = {Sanford Sherizen}, title = {Criminological concepts and research findings relevant for improving computer crime control}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {215--222}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90166-Q}, doi = {10.1016/0167-4048(90)90166-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sherizen90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Smulders90, author = {Peter Smulders}, title = {The threat of information theft by reception of electromagnetic radiation from {RS-232} cables}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {53--58}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90157-O}, doi = {10.1016/0167-4048(90)90157-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Smulders90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Tabbey90, author = {Kirk W. Tabbey}, title = {Computer crime: "Preparing the computer specific search warrant"}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {117--123}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90083-6}, doi = {10.1016/0167-4048(90)90083-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Tabbey90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Winters90, author = {Peter Winters}, title = {Secure systems design - an evolving national strategy}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {379--389}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90067-4}, doi = {10.1016/0167-4048(90)90067-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Winters90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wiseman90, author = {Simon R. Wiseman}, title = {Control of confidentiality in databases}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {529--537}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90131-C}, doi = {10.1016/0167-4048(90)90131-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wiseman90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood90, author = {Charles Cresson Wood}, title = {Principles of secure information systems design}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {13--24}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90150-R}, doi = {10.1016/0167-4048(90)90150-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood90a, author = {Charles Cresson Wood}, title = {How many information security staff people should you have?}, journal = {Comput. Secur.}, volume = {9}, number = {5}, pages = {395--402}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90069-6}, doi = {10.1016/0167-4048(90)90069-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood90b, author = {Charles Creson Wood}, title = {Spectacular computer crimes - what they are and how they cost American business half a billion dollars a year! : Buck Bloombecker, Don Jones-Irwin, Homewood, IL, 1990}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {557}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90134-F}, doi = {10.1016/0167-4048(90)90134-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood90c, author = {Charles Cresson Wood}, title = {Fifteen major forces driving the civilian information security market}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {677--686}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90109-7}, doi = {10.1016/0167-4048(90)90109-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac90, author = {Bernard P. Zajac Jr.}, title = {Computer viruses: Can they be prevented?}, journal = {Comput. Secur.}, volume = {9}, number = {1}, pages = {25--31}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90151-I}, doi = {10.1016/0167-4048(90)90151-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac90a, author = {Bernard P. Zajac Jr.}, title = {People: The "other" side of computer security}, journal = {Comput. Secur.}, volume = {9}, number = {4}, pages = {301--303}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90097-D}, doi = {10.1016/0167-4048(90)90097-D}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac90b, author = {Bernard P. Zajac Jr.}, title = {The 1990s - what will they hold?}, journal = {Comput. Secur.}, volume = {9}, number = {6}, pages = {503--507}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90126-E}, doi = {10.1016/0167-4048(90)90126-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zajac90c, author = {Bernard P. Zajac Jr.}, title = {Interview with Clifford Stoll}, journal = {Comput. Secur.}, volume = {9}, number = {7}, pages = {601--603}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90057-Z}, doi = {10.1016/0167-4048(90)90057-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zajac90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZviranH90, author = {Moshe Zviran and William J. Haga}, title = {Cognitive passwords: The key to easy access control}, journal = {Comput. Secur.}, volume = {9}, number = {8}, pages = {723--736}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90115-A}, doi = {10.1016/0167-4048(90)90115-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZviranH90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZviranHM90, author = {Moshe Zviran and James C. Hoge and Val A. Micucci}, title = {{SPAN} - a {DSS} for security plan analysis}, journal = {Comput. Secur.}, volume = {9}, number = {2}, pages = {153--160}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90089-C}, doi = {10.1016/0167-4048(90)90089-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZviranHM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.