


default search action
Computers & Security, Volume 15
Volume 14, Number 1, 1995
- Harold Joseph Highland:

Random bits & bytes. 4-13 - Martin Smith, John Sherwood:

Business continuity planning. 14-23 - Marshall D. Abrams, Michael V. Joyce:

Trusted system concepts. 45-56 - Marshall D. Abrams, Michael V. Joyce:

Trusted computing update. 57-68 - Marshall D. Abrams, Michael V. Joyce:

New thinking about information technology security. 69-81
Volume 14, Number 2, 1995
- Harold Joseph Highland:

Random Bits & Bytes. 90-102 - Manfred Möhrenschlager:

Hacking: To criminalize or not ? - suggestions for the legislature. 103-112 - Henry B. Wolfe:

Computer security: For fun and profit. 113-115 - Tzong-Chen Wu, Wei-Hua He:

A geometric approach for sharing secrets. 135-145 - Marshall D. Abrams, Jonathan D. Moffett:

A higher level of computer security through active policies. 147-157 - Hui-Min Tsai, Chin-Chen Chang:

A cryptographic implementation for dynamic access control in a user hierarchy. 159-166 - John G. Cleary, Sean A. Irvine, Ingrid Rinsma-Melchert:

On the insecurity of arithmetic coding. 167-180
Volume 14, Number 3, 1995
- Harold Joseph Highland:

Random bits & bytes. 188-196 - Edwin B. Heinlein:

Principles of information systems security. 197-198 - Scott Hill, Martin Smith:

Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace. 199-204 - Hyun-jung Kim:

Biometrics, is it a viable proposition for identity authentication and access control? 205-214 - Frank Deane

, Kate Barrelle, Ron Henderson, Doug Mahar:
Perceived acceptability of biometric security systems. 225-231 - Matt Bishop

, Daniel V. Klein:
Improving system security via proactive password checking. 233-249 - H. A. S. Booysen, Jan H. P. Eloff:

Classification of objects for improved access control. 251-265
Volume 14, Number 4, 1995
- Harold Joseph Highland:

Random bits & bytes. 274-282 - Charles Cresson Wood:

Shifting information systems security responsibility from user organizations to vendor/publisher organizations. 283-284 - Charles Cresson Wood, Karen Snow:

ISO 9000 and information security. 287-288 - Gerald L. Kovacich:

Recovering computer-generated evidence. 289-296 - Simon R. Wiseman:

Classification services in the SWORD secure DBMS. 307-321 - Greg O'Shea:

Redundant access rights. 323-348 - Simon J. Shepherd:

A high speed software implementation of the Data Encryption Standard. 349-357
Volume 14, Number 5, 1995
- Harold Joseph Highland:

Random bits & bytes. 365-371 - Jean Hitchings:

Deficiencies of the traditional approach to information security and the requirements for a new methodology. 377-383 - John Leach:

Dynamic authentication for smartcards. 385-389 - Sarah Gordon:

Technologically enabled crime: Shifting paradigms for the Year 2000. 391-402 - Anastasia Doumas, Konstantinos Mavroudakis

, Dimitris Gritzalis, Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses. 435-448 - Muninder P. Kailay, Peter Jarratt:

RAMeX: a prototype expert system for computer security risk analysis and management. 449-463 - Thomas Hardjono, Jennifer Seberry:

Applications of smartcards for anonymous and verifiable databases. 465-472
Volume 14, Number 6, 1995
- Harold Joseph Highland:

Random bits & bytes. 480-488 - Claude Oliver:

Privacy, anonymity and accountability. 489-490 - Alan R. Krull:

Controls in the next millennium: Anticipating the IT-enabled future. 491-495 - Jim Reid:

Open systems security: Traps and pitfalls. 496-517 - Frank Stoll:

The need for decentralization and privacy in mobile communications networks. 527-539 - Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson:

MCF: a malicious code filter. 541-566
Volume 14, Number 7, 1995
- Harold Joseph Highland:

Random bits & bytes. 574-585 - Christopher L. J. Holloway:

Controlling the use of cryptographic keys. 587-598 - Sarah Gordon:

Internet 101. 599-604 - Ben Soh, Tharam S. Dillon:

Setting optimal intrusion-detection thresholds. 621-631 - Fred de Koning:

A methodology for the design of security plans. 633-643 - James Backhouse, Gurpreet Dhillon:

Managing computer crime: a research outlook. 645-651
Volume 14, Number 8, 1995
- Harold Joseph Highland:

Random bits & bytes. 660-666 - Charles Cresson Wood:

Writing infosec policies. 667-674 - Rebecca J. Duncan:

There are some cracks in the cornerstone of information security. 675-680 - Christopher L. J. Holloway:

Controlling digital signature services using a smartcard. 681-690 - Kenneth R. Lindup:

A new model for information security policies. 691-695 - Love Ekenberg

, Subhash Oberoi, István Orci:
A cost model for managing information security hazards. 707-717 - Marshall D. Abrams, Marvin V. Zelkowitz:

Striving for correctness. 719-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














