default search action
Computers & Security, Volume 3
Volume 3, Number 1, February 1984
- Rolf Moulton:
Data security is a management responsibility. 3-7 - Harvey S. Koch:
Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation. 9-19 - James A. Schweitzer:
Personal workstation automation security vulnerabilities. 21-28 - Ruth A. Seif:
Contingency planning in the banking community. 29-34 - Arthur E. Oldehoeft, Robert McDonald:
A software scheme for user-controlled file encryption. 35-41 - Sig Porter:
Cryptology and number sequences: Pseudorandom, random, and perfectly random. 43-44 - Albert A. Mullin:
A note on the mathematics of public-key cryptosystems. 45-47 - Michael Comer:
Computer crime needs international countermeasures. 53-55
Volume 3, Number 2, May 1984
- Harold Joseph Highland:
Editorial. 77-79 - Donn B. Parker:
Safeguards selection principles. 81-91 - Rolf T. Moulton:
A practical approach to system security devices. 93-99 - Arthur Sorkin, C. James Buchanan:
Measurement of cryptographic capability protection algorithms. 101-116 - Ilias Kaperonis:
Industrial espionage. 117-121 - Morrison Bump Jr.:
A primer on software piracy cases in the courts. 123-134 - Charles Cresson Wood:
Securicom '84. 140-142
Volume 3, Number 3, August 1984
- Harold Joseph Highland:
Editorial. 169-170 - Bram van den Berg, Hans Leenaars:
Advanced topics of a computer center audit. 171-185 - Ben F. Barton, Marthalee S. Barton:
User-friendly password methods for computer-mediated information systems. 186-195 - Mariagrazia Fugini, Giancarlo Martella:
ACTEN: A conceptual model for security systems design. 196-214 - Chadwick H. Nestman, John C. Windsor, Mary C. Hinson:
Tutorial on telecommunications and security. 215-224 - Richard I. Polis:
Information security: Reality and fiction. 225-228 - Warren W. Fisher:
Cryptography for computer security: Making the decision. 229-233 - Lothar Krause:
Data encryption in ISO, the International Organization for Standardization. 234-236
Volume 3, Number 4, November 1984
- Harold Joseph Highland:
Editorial. 257 - Ronald Paans:
Computer security and EDP-auditing: The twin guards. 259-261 - I. S. Herschberg, Ronald Paans:
The programmer's threat: Cases and causes. 263-272 - F. Buurmeijer:
IBM's data security strategy: Some implementation aspects. 273-277 - Ronald Paans, I. S. Herschberg:
A topology for secure MVS systems. 278-285 - C. P. Louwerse, J. M. L. Kouwenberg:
Data protection aspects in an integrated hospital information system. 286-294 - W. R. C. van Hoboken:
The burglar's viewpoint. 295-302 - R. Toppen:
Infinite confidence: 'The audit of data communication networks'. 303-313 - Ad J. van de Goor:
Effects of technical developments on system security. 314-322 - Ronald Paans:
ECOMA-12 European computer measurement association conference : Special interest group on performance aspects of computer security. 323-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.