default search action
Computers & Security, Volume 6
Volume 6, Number 1, February 1987
- Harold Joseph Highland:
In this issue... 1-3 - Harold Joseph Highland:
Computer viruses and sudden death! 8-10 - Rolf T. Moulton:
How to supervise and control I/S Security Officers and Auditors. 17-21 - Fred Cohen:
Computer viruses: Theory and experiments. 22-35 - Viiveke Fåk:
Crypto management made manageable - Demands on crypto equipment design. 36-40 - June M. Power, Steve R. Wilbur:
Authentication in a heterogeneous environment. 41-48 - Artur Solarz:
Computer-related embezzlement. 49-53 - Dennis Longley:
Expert systems applied to the analysis of key management schemes. 54-67 - Peter P. C. H. Kingston, Martin Goulbourn:
Security for microcomputers used in small business. 68-72 - Harold Joseph Highland:
Data physician - A virus protection program. 73-79
Volume 6, Number 2, April 1987
- Harold Joseph Highland:
In this issue... 97-98 - Harold Joseph Highland:
How secure are your encryption keys? 99-100 - Harold Joseph Highland:
The DES revisited - Part II. 100-101 - Harold Joseph Highland:
Computer security: A new focus at the National Bureau of Standards. 102-103 - Harold Joseph Highland:
Technology watch. 103-108 - Harold Joseph Highland:
The charade of computer security. 108-109 - Harold Joseph Highland:
Random notes and reports. 109-110 - Juhani Saari:
Computer crime - numbers lie. 111-117 - Fred Cohen:
Protection and administration of information networks with partial orderings. 118-128 - James A. Schweitzer:
How security fits in - a management view: Security is an essential for quality information. 129-132 - I. S. Herschberg:
The hackers' comfort. 133-138 - Tung Bui, Taracad R. Sivasankaran:
Cost-effectiveness modeling for a decision support system in computer security. 139-151 - Niv Ahituv, Yeheskel Lapid, Seev Neumann:
Verifying the authentication of an information system user. 152-157 - Andreas Pfitzmann, Michael Waidner:
Networks without user observability. 158-166 - Ronald Paans:
IFIP/Sec'86: Information security: The challenge. 167-171 - Ronald Paans:
ECOMA-14. 172 - Ronald Paans:
First European Conference on Computer Audit, Control & Security. 173-176 - J. A. N. Lee, Gerald Segal:
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking. 177-179
Volume 6, Number 3, June 1987
- Harold Joseph Highland:
From the editor. 193-194 - Harold Joseph Highland:
Data encryption standard II? 195-196 - Harold Joseph Highland:
Report from Beijing. 196-198 - Harold Joseph Highland:
Information sources. 198-199 - Harold Joseph Highland:
Encryption package. 199-202 - Harold Joseph Highland:
US data controls. 202-203 - Harold Joseph Highland:
Computer security and law. 203-205 - Harold Joseph Highland:
Cipher cracking. 205 - Karl Rihaczek:
TeleTrusT-OSIS and communication security. 206-218 - Fred Cohen:
Design and administration of distributed and hierarchical information networks under partial orderings. 219-228 - Harold Joseph Highland:
How to evaluate microcomputer encryption software and hardware. 229-244 - Patricia A. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham:
Multilevel Security in Database Management Systems. 245-251 - Richard J. Johnstone:
Key updating flags in EFT-POS security systems. 252-260 - Philippe van Heurck:
TRASEC: Belgian security system for electronic funds transfers. 261-268
Volume 6, Number 4, August 1987
- Harold Joseph Highland:
From the editor... 285-287 - Harold Joseph Highland:
Would you report a suspected data crime to the authorities? 288-295 - John M. Carroll:
Strategies for extending the useful lifetime of DES. 300-313 - Charles Cresson Wood:
Information systems security: Management success factors. 314-320 - Maria M. Pozzo, Terence E. Gray:
An approach to containing computer viruses. 321-331 - Fred Cohen:
Design and protection of an information network under a partial ordering: A case study. 332-338 - Chris J. Mitchell, Fred Piper:
The cost of reducing key-storage requirements in secure networks. 339-341 - Achim Jung:
Implementing the RSA cryptosystem. 342-350 - Viiveke Fåk:
Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4. 351
Volume 6, Number 5, October 1987
- Harold Joseph Highland:
From the editor. 365-367 - Harold Joseph Highland:
Secure fax transmission. 368-370 - J.-C. Spender:
Identifying computer users with authentication devices (tokens). 385-395 - C. Fernández, A. Vaquero, José M. Troya, J. M. Sánchez:
Automating the computation of authenticators for interbank telex messages. 396-402 - Ronald Paans, I. S. Herschberg:
Computer security: The long road ahead. 403-416 - Gerald V. Post:
Improving operating system security. 417-425
Volume 6, Number 6, December 1987
- Harold Joseph Highland:
From the editor. 445-446 - Harold Joseph Highland:
New member of the International Board of Editors. 447 - Harold Joseph Highland:
Computer abuse and managerial response. 448 - Harold Joseph Highland:
Data cartridge for secure data. 449-451 - Harold Joseph Highland:
Passwords revisited. 451-452 - Harold Joseph Highland:
Office automation security. 452-457 - Harold Joseph Highland:
Tempest over leaking computers. 457-458 - Harold Joseph Highland:
Hard disk recovery tools. 458-462 - Harold Joseph Highland:
Random notes. 463 - Sidney L. Smith:
Authenticating users by word association. 464-470 - Bruce J. Baird, Lindsay L. Baird Jr., Ronald P. Ranauro:
The moral cracker? 471-478 - Bhavani M. Thuraisingham:
Security checking in relational database management systems augmented with inference engines. 479-492 - Sergio B. Guarro:
Principles and procedures of the LRAM approach to information systems risk analysis and management. 493-504 - Fred Cohen:
A cryptographic checksum for integrity protection. 505-510 - Charles Cresson Wood:
The human immune system as an information systems security reference model. 511-516
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.