default search action
Computers & Security, Volume 17
Volume 17, Number 1, 1998
- Bill Hancock:
From the editor. 2-4 - Bill Hancock:
Security goes prime-time. 5-13 - Will Ozier:
GSSP preface/overview. 14-18 - August Bequai:
High-tech security and the failings of president clinton's commission on critical infrastructure protection. 19-21 - August Bequai:
Software pirating and management's quagmire. 22-26 - Chris Pounder:
Homeworking: No longer an easy option? 27-30 - Stephen Hinde:
Hot water, icebergs and other disasters. 31-33 - Keith Osborne:
Auditing the IT security function. 34-41 - Norman Crocker:
Key concerns in a review of CA-ACF2/MVS. 42-53 - Marius Nacht:
The spectrum of modern firewalls. 54-56 - Vesselin Bontchev:
Macro virus identification problems. 69-89
Volume 17, Number 2, 1998
- Bill Hancock:
From the Editor. 96-97 - Bill Hancock:
Who do you call for, CISSP. 99-109 - Richard Ford:
What a littledefinution can do. 110-114 - Stephen Hinde:
Cyber Wars and other threats. 115-118 - Oliver Lau:
The ten commandments of security. 119-123 - Chris Pounder:
Security and the new Data Protection law. 124-128 - Gerald L. Kovacich:
Electronic-internet business and security. 129-135 - Mark Moulton:
Reducing charges of E-comm harassment. 137-142 - Sharman Lichtenstein:
Internet risks for companies. 143-150 - Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani:
On probabilities of hash value matches. 171-176 - Ed Dawson, Helen Gustafson:
A Method for Measuring Entropy of Symmetric Cipher Key Generators. 177-184
Volume 17, Number 3, 1998
- Bill Hancock:
From the editor. 190-191 - Bill Hancock:
Security Views. 192-200 - Nicky Maddison:
Y2000 enters the body politic. 201-206 - Stephen Hinde:
Recent security surveys. 207-210 - Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler:
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. 211-221 - Gert van der Merwe, Jan H. P. Eloff:
Software source code, visual risk analysis: an example. 233-252 - Tom Coffey, Thomas Newe:
Realisation of a minimum-knowledge identification and signature scheme. 253-264 - Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption. 265-272
Volume 17, Number 4, 1998
- Bill Hancock:
From the editor. 278-279 - Bill Hancock:
Security views. 280-292 - August Bequai:
Balancing legal concerns over crime and security in cyberspace. 293-298 - Stephen Hinde:
Contingency planning for the millenium. 299-302 - Thomas Finne:
A conceptual framework for information security management. 303-307 - Chris Pounder:
Further developments in the field of encryption and digital signatures. 308-312 - Pauline Ratnasingham:
EDI security: The influences of trust on EDI risks. 313-324 - Sebastiaan H. von Solms, J. H. S. Geldenhuys:
Collecting security baggage on the internet. 337-345 - Les Labuschagne, Jan H. P. Eloff:
The use of real-time risk analysis to enable dynamic activation of countermeasures. 347-357
Volume 17, Number 5, 1998
- Bill Hancock:
From the editor. 368-369 - August Bequai:
Techno-crimes: Failings of the legal edifice. 381-384 - Stephen Hinde:
Solar radiation is bad for you. 385-388 - J. R. Benton:
Physical IT security. 389-391 - Chris Pounder:
European commission takes action to secure the internet. 392-396 - Thomas Finne:
The three categories of decision-making and information security. 397-405 - Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations. 417-433 - Sebastiaan H. von Solms:
Electronic commerce with secure intelligent trade agents. 435-446 - Birgit Borcherding, Malte Borcherding:
Efficient and trustworthy key distribution in webs of trust. 447-454
Volume 17, Number 6, 1998
- Bill Hancock:
From the editor. 460-461 - Bill Hancock:
Security tradeshows - Good or bad? 462-474 - Stephen Hinde:
Privacy and security - The drivers for growth of E-Commerce. 475-478 - Chris Pounder:
The Annual Report of the UK Data Protection Registrar. 479-482 - Fred Cohen:
A note on the role of deception in information protection. 483-506 - Nada Kapidzic:
Creating security applications based on The Global Certificate Management System. 507-515 - H. J. Jerry Schumacher, Sumit Ghosh:
A Fundamental Framework for Network Security Towards Enabling Security on Demand in an ATM Network. 527-542 - Chu-Hsing Lin, Tien-Chi Lee:
A confused document encrypting scheme and its implementation. 543-551
Volume 17, Number 7, 1998
- Bill Hancock:
From the editor. 562-563 - Bill Hancock:
Windows-98, RIP and my Adrenaline Rush. 564-574 - Richard Ford:
May you live in interesting times. 575-578 - August Bequai:
A guide to cyber-crime investigations. 579-582 - Stephen Hinde:
Corporate governance and disasters. 583-585 - Sarah Gordon:
Breaking the chain. 586-588 - Gerald Post, Albert Kagan:
The use and effectiveness of anti-virus software. 589-599 - Gerald L. Kovacich:
Establishing an Information Systems Security Organization (ISSO). 600-612 - J. Schwemmlein, Karl C. Posch, Reinhard Posch:
RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. 637-650
Volume 17, Number 8, 1998
- Bill Hancock:
From the editor. 652-653 - Bill Hancock:
Security views. 654-666 - August Bequai:
Employee abuses in cyberspace: Management's legal quagmire. 667-670 - Stephen Hinde:
Time, history and war: A personal voyage through Compsec '98. 671-681 - H. S. Venter, Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. 683-692 - Winn Schwartau:
Time-based security explained: Provable security models and formulas for the practitioner and vendor. 693-714 - Peng-Chor Leong, Wen-Jing Hsu, Peng-Chong Tan:
A geometric approach for shared secrets, a refinement. 725-732
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.