%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.00", %%% date = "23 September 2019", %%% time = "11:29:18 MDT", %%% filename = "computsecur1980.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "02981 21403 74183 816040", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Computers and %%% Security", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of the %%% journal Computers and Security (CODEN CPSEDU, %%% ISSN 0167-4048 (print), 1872-6208 %%% (electronic)) for the decade 1980--1989. %%% %%% The journal is published by Elsevier, and %%% publication began with volume 1, number 1, in %%% January 1982. The issue count per annual %%% volume rose from 3 (volumes 1--2) to 4 %%% (volumes 3--5) to 6 (volumes 6--7) to 8 %%% (volumes 9--31). From volume 32 in 2013, %%% issues are no longer assigned, and there are %%% multiple volumes per year. %%% %%% The journal has Web sites at %%% %%% https://www.sciencedirect.com/journal/computers-and-security %%% http://www.sciencedirect.com/science/journal/01674048 %%% %%% At version 1.00, the COMPLETE year coverage %%% looked like this: %%% %%% 1982 ( 56) 1985 ( 60) 1988 ( 457) %%% 1983 ( 63) 1986 ( 104) 1989 ( 118) %%% 1984 ( 65) 1987 ( 115) %%% %%% Article: 1038 %%% %%% Total entries: 1038 %%% %%% Entries for this bibliography have been %%% derived primarily from data at the publisher %%% Web site, but have been augmented by data %%% from the BibNet Project and TeX User Group %%% bibliography archives. %%% %%% Spelling has been verified with the UNIX %%% spell and GNU ispell programs using the %%% exception dictionary stored in the companion %%% file with extension .sok. BibTeX citation %%% tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title %%% words. Citation tags were automatically %%% generated by software developed for the %%% BibNet Project. In this bibliography, %%% entries are sorted in publication order using %%% bibsort -byvolume. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-COMPUT-SECUR = "Computers \& Security"} %%% ==================================================================== %%% Bibliography entries, sorted in publication order with ``bibsort %%% --byvolume'': @Article{Highland:1982:Ea, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "1--2", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900189", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:IBE, author = "Anonymous", title = "International board of editors", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "3--8", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900190", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fordyce:1982:CSC, author = "Samantha Fordyce", title = "Computer security: a current assessment", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "9--16", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900207", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Perry:1982:DCS, author = "William E. Perry", title = "Developing a computer security and control strategy", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "17--26", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900219", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Guillou:1982:CT, author = "L. C. Guillou and B. Lorig", title = "Cryptography and teleinformatics", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "27--33", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900220", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Friedman:1982:CDP, author = "Stanley Friedman", title = "Contingency and disaster planning", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "34--40", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900232", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{BloomBecker:1982:ICC, author = "Jay BloomBecker", title = "International computer crime: Where terrorism and transborder data flow meet", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "41--53", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900244", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Porter:1982:PEI, author = "Sigmund N. Porter", title = "A password extension for improved human factors", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "54--56", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900256", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kurzban:1982:SBA, author = "Stanley A. Kurzban", title = "A selective, briefly annotated bibliography of works on data security and privacy", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "57--64", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900268", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1982:FAC, author = "Charles Cresson Wood", title = "Future applications of cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "65--71", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290027X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Willett:1982:TPK, author = "Michael Willett", title = "A tutorial on public key cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "72--79", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900281", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Henry:1982:FDA, author = "Paul S. Henry", title = "Fast decryption algorithm for the knapsack cipher", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "80--83", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900293", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:BRCa, author = "Anonymous", title = "Book Review: {{\booktitle{Cryptography: a primer}}: Alan G. Konheim: New York: John Wiley and Sons, 1981. xiv + 432 pp. \$34.95}", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "84--84", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290030X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:BRCb, author = "Anonymous", title = "Book Review: {{\booktitle{Computer control and security: a guide for managers and systems analysts}}: William E. Perry: New York: John Wiley and Sons, 1981. xiii + 207 pp. \$22.95}", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "85--85", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900311", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:CLA, author = "Anonymous", title = "Current literature: Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "86--91", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900323", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "92--94", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900335", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "ifc--ifc", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900177", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:PJa, author = "Anonymous", title = "Pages 1--94 ({January 1982})", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "??--??", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:Eb, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "95--95", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900013", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:NMI, author = "Anonymous", title = "New members of the international board of editors", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "97--98", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900025", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Courtney:1982:SAD, author = "Robert H. Courtney", title = "A systematic approach to data security", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "99--112", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900037", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Blom:1982:SMD, author = "Rolf Blom and Jan-Olof Br{\"u}er and Viiveke F{\aa}k and S. Ingvar {\AA}kersten", title = "On security measures in distributed computer systems", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "113--122", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900049", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1982:CCB, author = "John M. Carroll", title = "The control of computer-based fraud", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "123--138", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900050", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1982:PDC, author = "Charles Cresson Wood", title = "Policies for deterring computer abuse", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "139--145", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900062", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Moulton:1982:MAI, author = "Rolf Moulton", title = "A multidisciplinary approach to the investigation of computer abuse incidents", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "146--151", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900074", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Neugent:1982:TCS, author = "William Neugent", title = "Teaching computer security: a course outline", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "152--163", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900086", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:GNC, author = "Esther Harris Highland and Harold Joseph Highland", title = "A guide to {NBS} computer security literature", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "164--176", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900098", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Willett:1982:CON, author = "Michael Willett", title = "Cryptography old and new", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "177--186", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900104", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:POC, author = "Anonymous", title = "Professional organizations in computer security", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "187--190", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900116", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:BRMa, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Managing information security: a program for the electronic information age}}: James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. \$15.95}", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "191--191", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900128", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:BRMb, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Management guide to computer security}}: J. R. Talbot, New York: John Wiley and Sons, 1981. xi + 180 pp. \$29.95}", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "191--192", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290013X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:SSS, author = "Esther H. Highland", title = "{System security standard for electronic data processing: Rolf Moulton New York: the city of New York, 1981. \$7.50}", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "192--192", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900141", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "193--199", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900153", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "200--200", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900165", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:PJb, author = "Anonymous", title = "Pages 95--200 ({June 1982})", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "??--??", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Murray:1982:SPP, author = "William Hugh Murray", title = "Security procedures for program libraries", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "201--209", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900347", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Shaw:1982:EGA, author = "James K. Shaw and Stuart W. Katzke", title = "An executive guide to {ADP} contingency planning", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "210--215", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900359", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ball:1982:DRS, author = "Leslie D. Ball and Gail Dentch and Mary Emerson and Martha Lewis and Susan McWhorter and Frank Turgeon", title = "Disaster recovery services", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "216--225", month = nov, year = "1982", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/0167-4048(82)90036-0", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900360", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Linden:1982:SEM, author = "Christer Lind{\'e}n and Hans Block", title = "Sealing electronic money in {Sweden}", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "226--230", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900372", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Reed:1982:RTY, author = "Susan K. Reed and Dennis K. Branstad", title = "Reflections on ten years of computer security", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "231--232", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900384", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:EGC, author = "Anonymous", title = "Executive guide to computer security", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "233--241", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900396", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1982:EN, author = "Harold Joseph Highland", title = "{Editor}'s note", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "242--242", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900402", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Willett:1982:GE, author = "Michael Willett", title = "Guest editorial", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "243--244", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900414", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kahn:1982:GLC, author = "David Kahn", title = "The grand lines of cryptology's development", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "245--248", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900426", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Buck:1982:PCS, author = "R. Creighton Buck", title = "The public cryptography study group", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "249--254", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900438", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Branstad:1982:ISS, author = "Dennis K. Branstad and Miles E. Smid", title = "Integrity and security standards based on cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "255--260", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290044X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Banerjee:1982:HSI, author = "Subodh K. Banerjee", title = "High speed implementation of {DES}", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "261--267", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900451", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Schanning:1982:APK, author = "Brian P. Schanning", title = "Applying public key distribution to local area networks", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "268--274", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900463", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jayant:1982:ASS, author = "N. S. Jayant", title = "Analog scramblers for speech privacy", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "275--289", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900475", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{RFB:1982:BRMa, author = "RFB", title = "Book Review: {{\booktitle{Management guide to computer security}}: J. P. Talbot, New York: John Wiley and Sons, 1981. xi + 180 pp. \$29.95}", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "290--291", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900487", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{RFB:1982:BRMb, author = "RFB", title = "Book Review: {{\booktitle{Multi-national computer systems: an introduction to transnational data flow and data regulation}}: Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. \$16.95}", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "291--292", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900499", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "293--297", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900505", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "298--298", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900517", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:SIV, author = "Anonymous", title = "Subject index to volume 1", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "299--302", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900529", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:AIV, author = "Anonymous", title = "Author index to volume 1", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "303--304", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900530", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1982:PN, author = "Anonymous", title = "Pages 201--304 ({November 1982})", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "??--??", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:Ea, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "1--2", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900263", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:TNM, author = "Anonymous", title = "Three new members of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "3--4", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900275", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1983:EISa, author = "Charles Cresson Wood", title = "Effective information system security with password controls", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "5--10", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900287", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1983:NTD, author = "Belden Menkus", title = "Notes on terrorism and data processing", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "11--15", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900299", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Murray:1983:CSO, author = "William H. Murray", title = "Computer security: Observations on the state of the technology", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "16--23", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900305", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Caroll:1983:MSA, author = "John M. Caroll and Oi-Lun Wu", title = "Methodology for security analysis of data-processing systems", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "24--34", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900317", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Backwith:1983:UAS, author = "Nigel Backwith", title = "Unique approach to security evaluation", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "35--40", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900329", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Weingarten:1983:CCP, author = "F. Weingarten", title = "Controlling cryptographic publication", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "41--48", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900330", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bussolati:1983:TNA, author = "U. Bussolati and G. Martella", title = "Towards a new approach to secure database design", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "49--62", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900342", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Goldstein:1983:CCP, author = "Bruce Goldstein", title = "Computer crime and its prevention", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "63--66", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900354", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cerullo:1983:DCC, author = "Michael J. Cerullo", title = "Data communications controls", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "67--72", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900366", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Guynes:1983:EIC, author = "Steve Guynes", title = "{EFTS} impact on computer security", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "73--77", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900378", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Callaghan:1983:SDW, author = "David R. Callaghan", title = "Securing the distributed word processing network", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "78--81", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390038X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:BRH, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{The hut six story: Breaking the Enigma codes}}: Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. $x$ + 326 pp., \$12.95}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "82--83", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900391", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:BRCa, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{CBEMA privacy and security bibliography (October 1982)}}: Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp.}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "83--83", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900408", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:BRCb, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Codes, ciphers and computers: an introduction to information security}}: Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., \$13.95}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "83--84", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390041X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:BRA, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Advances in computer system security}}: Rein Turn, editor: Dedham MA: Artech House, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) \$29.50}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "84--84", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900421", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:BRT, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Tutorial: the security of data in networks}}: Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., \$20.00 to non-members and \$15.00 to members of IEEE}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "84--84", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900433", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:OTA, author = "Anonymous", title = "The {Office} of Technology Assessment reports", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "85--87", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900445", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "88--96", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900457", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "97--98", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900469", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "ifc--ifc", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900251", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:PJa, author = "Anonymous", title = "Pages 1--98 ({January 1983})", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "??--??", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:IS, author = "Anonymous", title = "{IFIP\slash Sec '83}", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "99--101", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900470", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bound:1983:MRA, author = "William A. J. Bound and Dennis R. Ruth", title = "Making risk analysis a useful management tool with microcomputer electronic worksheet packages", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "102--115", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900482", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Beckman:1983:IFS, author = "Kristian Beckman", title = "{IFIP}'s first security congress: the multi-million step", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "117--119", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900494", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:ISI, author = "Anonymous", title = "{IFIP\slash Sec '83} --- {IFIP}'s First Security Conference", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "120--131", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900500", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Warren:1983:ERC, author = "Andrew D. Warren", title = "Evaluating the risks of computer fraud and error", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "132--143", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900512", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1983:SSV, author = "Ronal Paans and Guus Bonnes", title = "Surreptitious security violation in the {MVS} operating system", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "144--152", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900524", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bonyun:1983:UAP, author = "David A. Bonyun", title = "The use of architectural principles in the design of certifiably secure systems", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "153--162", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900536", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoving:1983:IAC, author = "Per L. Hoving", title = "To install an Access Control System, activities and checklists", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "163--170", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900548", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:IMT, author = "Harold Joseph Highland", title = "Impact of microcomputers on total computer security", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "171--183", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390055X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:POCa, author = "Anonymous", title = "Professional organizations in computer security", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "184--185", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900561", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:CCB, author = "Anonymous", title = "Computer crime: {Bureau of Justice Statistics, U.S. Department of Justice}", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "186--188", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900573", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:CST, author = "Esther H. Highland", title = "Computer Security Techniques: List of controls by cost", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "189--193", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900585", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "194--205", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900597", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "206--211", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900603", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:PJb, author = "Anonymous", title = "Pages 99--211 ({June 1983})", journal = j-COMPUT-SECUR, volume = "2", number = "2", pages = "??--??", month = jun, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1983:Eb, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "213--213", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900019", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:NMI, author = "Anonymous", title = "New members of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "214--217", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900020", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lobel:1983:SAC, author = "Jerome Lobel", title = "The state-of-the-art in computer security", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "218--222", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900032", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1983:EISb, author = "Charles Cresson Wood", title = "Enhancing information security with the information resource management approach", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "223--229", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900044", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1983:DSR, author = "John M. Carroll", title = "Decision support for risk analysis", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "230--236", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900056", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fry:1983:CME, author = "Brian G. P. Fry and William F. Main", title = "A conceptual methodology for evaluating security requirements for data assets", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "237--241", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900068", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Koch:1983:IIT, author = "Harvey S. Koch", title = "Implementing an integrated test facility audit using differential files", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "242--247", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390007X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hartson:1983:TPC, author = "H. Rex Hartson", title = "Teaching protection in computing: a research-oriented graduate course", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "248--255", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900081", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Eloff:1983:SPS, author = "Jan H. P. Eloff", title = "Selection process for security packages", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "256--260", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900093", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ayoub:1983:DCE, author = "F. Ayoub", title = "The design of complete encryption networks using cryptographically equivalent permutations", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "261--267", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390010X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sorkin:1983:RST, author = "Arthur Sorkin", title = "Requirements for a secure terminal switch", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "268--274", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900111", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bottom:1983:ITS, author = "Norman R. Bottom", title = "An informational theory of security", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "275--280", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900123", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:NIT, author = "Anonymous", title = "News from {IFIP TC-11}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "281--282", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900135", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:POCb, author = "Anonymous", title = "Professional organizations in computer security", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "283--285", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900147", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:ARAc, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "286--296", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900159", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRSa, author = "Anonymous", title = "Book Review: {{\booktitle{Security, IFIP\slash sec '83}}: Viiveke F{\aa}k, Editor: Proceedings of the first conference, Stockholm, Sweden, 16--19 May 1983. Amsterdam: North-Holland, 1983. xxxvi + 328 pp.\$39.00 (in United States and Canada). Dfl. 95.00 (rest of the world)}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "297--298", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900160", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRPa, author = "Anonymous", title = "Book Review: {{\booktitle{Protecting your microcomputer system}}: Harold Joseph Highland: New York: John Wiley and Sons, Inc., 1984. xxii + 244 pp. \$14.95}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "298--298", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900172", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRN, author = "Anonymous", title = "Book Review: {{\booktitle{Nine steps to effective EDP loss control}}: Tom S. Eason and Douglass A. Webb: Bedford, MA: Digital Press, Digital Equipment Company, 1982. xi + 177 pp.}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "299--299", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900196", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRPb, author = "Anonymous", title = "Book Review: {{\booktitle{Protecting information in the electronic workplace: a guide for managers}}: James A. Schweitzer: Reston VA: Reston Publishing Company, Inc., 1983. xiv + 146 pp. \$19.95 (hardbound) and \$14.95 (paperback)}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "299--299", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900184", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRC, author = "Anonymous", title = "Book Review: {{\booktitle{Computer security: an overview of national concern and challenge}}: Louise G. Becker: Washington DC: Library of Congress, 1983. xiv + 241 pp.}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "299--300", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900202", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:BRSb, author = "Anonymous", title = "Book Review: {{\booktitle{Security manual}}: Eric Oliver and John Wilson: [Fourth edition]. Brookfield VT: Gower Publishing Co., 1983. xiv + 228 pp. \$12.50}", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "300--300", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900214", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "301--304", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900226", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:SIV, author = "Anonymous", title = "Subject index to volume 2", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "305--308", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900238", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:AIV, author = "Anonymous", title = "Author index to volume 2", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "309--309", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390024X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1983:PN, author = "Anonymous", title = "Pages 213--309 ({November 1983})", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "??--??", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:E, author = "Anonymous", title = "Editorial", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "1--2", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900191", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Moulton:1984:DSM, author = "Rolf Moulton", title = "Data security is a management responsibility", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "3--7", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900208", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Koch:1984:ALS, author = "Harvey S. Koch", title = "Auditing on-line systems: an evaluation of parallel versus Continuous and Intermittent Simulation", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "9--19", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490021X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Schweitzer:1984:PWA, author = "James A. Schweitzer", title = "Personal workstation automation security vulnerabilities", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "21--28", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900221", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Seif:1984:CPB, author = "Ruth A. Seif", title = "Contingency planning in the banking community", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "29--34", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900233", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Oldehoeft:1984:SSU, author = "Arthur E. Oldehoeft and Robert McDonald", title = "A software scheme for user-controlled file encryption", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "35--41", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900245", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Porter:1984:CNS, author = "Sig Porter", title = "Cryptology and number sequences: Pseudorandom, random, and perfectly random", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "43--44", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900257", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mullin:1984:NMP, author = "Albert A. Mullin", title = "A note on the mathematics of public-key cryptosystems", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "45--47", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900269", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ISa, author = "Anonymous", title = "{IFIP\slash Sec'84}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "49--50", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900270", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:TWC, author = "Anonymous", title = "{TC-11} Working Conference on Informatics Security Management", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "50--52", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900282", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Comer:1984:CCN, author = "Michael Comer", title = "Computer crime needs international countermeasures", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "53--55", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900294", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRP, author = "Anonymous", title = "Book Review: {{\booktitle{The puzzle palace: a report on NSA, America's most secret agency}}: James Bamford: Boston: Houghton Mifflin Company, 1982, 465 pages. \$16.95}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "57--57", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900300", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRDa, author = "Anonymous", title = "Book Review: {{\booktitle{Data protection-data security-privacy}}: Luxembourg: Terminology Bureau of the Commission of the European Countries, 1981. 776 pages}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "57--58", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900312", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRAa, author = "Anonymous", title = "Book Review: {{\booktitle{Advances in computer security management. Volume 1}}: Thomas A. Rullo, editor: New York, (Heyden) John Wiley and Sons, 1980. 245 + xi pages}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "58--58", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900324", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRAb, author = "Anonymous", title = "Book Review: {{\booktitle{Advances in computer security management. Volume 2}}: Marvin M. Wofsey, editor: New York: John Wiley and Sons, 1983. 268 + xix pages. \$39.95}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "58--59", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900336", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRI, author = "Anonymous", title = "Book Review: {{\booktitle{Information integrity: a structure for its definition and management}}: Hal B. Becker: New York: McGraw Hill Book Co., 1983. 237 + xiii pages. \$26.95}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "59--60", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900348", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:BRDb, author = "Anonymous", title = "Book Review: {{\booktitle{Dictionary of computers, data processing and telecommunications}}: Jerry M. Rosenberg: New York: John Wiley and Sons, 1984. 614 + ix pages. \$29.95 hardcover, \$14.95 paperback}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "60--60", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490035X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "61--72", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900361", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "73--75", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900373", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "ifc--ifc", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490018X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:PF, author = "Anonymous", title = "Pages 1--75 ({February 1984})", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "??--??", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1984:Ea, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "77--79", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900488", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:NMI, author = "Anonymous", title = "New members of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "80--80", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490049X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Parker:1984:SSP, author = "Donn B. Parker", title = "Safeguards selection principles", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "81--91", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900506", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Moulton:1984:PAS, author = "Rolf T. Moulton", title = "A practical approach to system security devices", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "93--99", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900518", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sorkin:1984:MCC, author = "Arthur Sorkin and C. James Buchanan", title = "Measurement of cryptographic capability protection algorithms", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "101--116", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490052X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kaperonis:1984:IE, author = "Ilias Kaperonis", title = "Industrial espionage", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "117--121", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900531", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bump:1984:PSP, author = "Morrison Bump", title = "A primer on software piracy cases in the courts", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "123--134", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900543", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ICC, author = "Anonymous", title = "{International Carnahan Conference on Security Technology}", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "135--139", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900555", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ISJ, author = "Anonymous", title = "The {IPSA Silver Jubilee} conference", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "139--140", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900567", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1984:S, author = "Charles Cresson Wood", title = "Securicom '84", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "140--142", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900579", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ISb, author = "Anonymous", title = "{IFIP\slash Sec'84}", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "143--144", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900580", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:POC, author = "Anonymous", title = "Professional organizations in computer security", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "145--150", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900592", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "151--163", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900609", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "165--167", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900610", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:PM, author = "Anonymous", title = "Pages 77--167 ({May 1984})", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "??--??", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1984:Eb, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "169--170", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900385", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vandenBerg:1984:ATC, author = "Bram van den Berg and Hans Leenaars", title = "Advanced topics of a computer center audit", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "171--185", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900397", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Barton:1984:UFP, author = "Ben F. Barton and Marthalee S. Barton", title = "User-friendly password methods for computer-mediated information systems", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "186--195", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900403", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fugini:1984:ACM, author = "M. Fugini and G. Martella", title = "{ACTEN}: a conceptual model for security systems design", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "196--214", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900415", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Nestman:1984:TTS, author = "Chadwick H. Nestman and John C. Windsor and Mary C. Hinson", title = "Tutorial on telecommunications and security", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "215--224", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900427", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Polis:1984:ISR, author = "Richard I. Polis", title = "Information security: Reality and fiction", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "225--228", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900439", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fisher:1984:CCS, author = "Warren W. Fisher", title = "Cryptography for computer security: Making the decision", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "229--233", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900440", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Krause:1984:DEI, author = "Lothar Krause", title = "Data encryption in {ISO}, the International Organization for Standardization", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "234--236", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900452", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:CLD, author = "Anonymous", title = "Computer law decisions and opinions", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "237--248", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900464", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "249--251", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900476", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:PA, author = "Anonymous", title = "Pages 169--251 ({August 1984})", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "??--??", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:M, author = "Anonymous", title = "In Memoriam", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "253--255", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900014", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1984:Ec, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "257--257", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900026", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1984:CSE, author = "Ronald Paans", title = "Computer security and {EDP}-auditing: the twin guards", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "259--261", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900038", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Herschberg:1984:PTC, author = "I. S. Herschberg and R. Paans", title = "The programmer's threat: Cases and causes", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "263--272", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490004X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Buurmeijer:1984:IDS, author = "F. Buurmeijer", title = "{IBM}'s data security strategy: Some implementation aspects", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "273--277", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900051", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1984:TSM, author = "R. Paans and I. S. Herschberg", title = "A topology for secure {MVS} systems", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "278--285", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900063", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Louwerse:1984:DPA, author = "C. P. Louwerse and J. M. L. Kouwenberg", title = "Data protection aspects in an integrated hospital information system", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "286--294", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900075", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanHoboken:1984:BV, author = "W. R. C. van Hoboken", title = "The burglar's viewpoint", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "295--302", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900087", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Toppen:1984:ICA, author = "R. Toppen", title = "Infinite confidence: `The audit of data communication networks'", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "303--313", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900099", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vandeGoor:1984:ETD, author = "A. J. van de Goor", title = "Effects of technical developments on system security", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "314--322", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900105", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1984:EEC, author = "Ronald Paans", title = "{ECOMA-12: European Computer Measurement Association Conference}: Special interest group on performance aspects of computer security", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "323--324", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900117", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:Cd, author = "Anonymous", title = "Crypto '84", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "324--325", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900129", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:SDD, author = "Anonymous", title = "Security in distributed data sharing systems", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "325--327", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900130", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:ARAc, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "328--341", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900142", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:Ce, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "342--345", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900154", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:SIV, author = "Anonymous", title = "Subject index to volume 3", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "346--349", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900166", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:AIV, author = "Anonymous", title = "Author index to volume 3", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "350--351", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900178", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1984:PN, author = "Anonymous", title = "Pages 253--351 ({November 1984})", journal = j-COMPUT-SECUR, volume = "3", number = "4", pages = "??--??", month = nov, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:Ea, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "1--2", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900021", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:NMIa, author = "Anonymous", title = "New member of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "3--3", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900033", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1985:CFA, author = "John M. Carroll and W. R. Mac Iver", title = "{COSSAC}: a framework for analyzing and configuring secure computer facilities", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "5--12", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900045", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Schweitzer:1985:MVC, author = "James A. Schweitzer", title = "A management view: computer security as a discretionary decision", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "13--22", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900057", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gal:1985:SIA, author = "Graham Gal and William E. McCarthy", title = "Specification of internal accounting controls in a database environment", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "23--32", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900069", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cerullo:1985:GCC, author = "Michael J. Cerullo", title = "General controls in computer systems", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "33--45", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900070", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Serpell:1985:CES, author = "Stephen C. Serpell", title = "Cryptographic equipment security: a code of practice", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "47--64", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900082", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:FNC, author = "Harold Joseph Highland", title = "The first national computer security conference", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "65--73", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900094", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:DSC, author = "Anonymous", title = "Data security and confidentiality", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "75--81", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900100", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "83--95", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900112", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "97--99", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900124", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "ifc--ifc", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488590001X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:PM, author = "Anonymous", title = "Pages 1--100 ({March 1985})", journal = j-COMPUT-SECUR, volume = "4", number = "1", pages = "??--??", month = mar, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:Eb, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "101--102", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900136", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Auerbach:1985:PRI, author = "Isaac L. Auerbach", title = "Professional responsibility for information privacy", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "103--107", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900148", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Yeo:1985:IAC, author = "Gee Kin Yeo", title = "Incorporating access control in forms systems", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "109--122", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488590015X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:MSD, author = "Harold Joseph Highland", title = "Microcomputer security: Data protection techniques", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "123--134", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900161", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1985:EAR, author = "Belden Menkus", title = "The {EDP} auditor's role in computer security", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "135--138", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900173", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Miller:1985:TCS, author = "James E. Miller", title = "Transaction controls: Steps to take after the equipment has been secured", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "139--141", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900185", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Eloff:1985:DSL, author = "Jan H. P. Eloff", title = "The development of a specification language for a computer security system", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "143--147", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900197", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoving:1985:MFM, author = "Per L. Hoving and Johan Ess{\'e}n", title = "Minutes from the first meeting of {TC} 11, security and protection in information processing systems", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "149--152", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900203", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:ITC, author = "Anonymous", title = "{IFIP} technical committee 11 members", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "153--159", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900215", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:SIC, author = "Anonymous", title = "Second international congress on computer security", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "161--171", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900227", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:POC, author = "Anonymous", title = "Professional organizations in computer security", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "173--174", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900239", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "175--181", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900240", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "183--184", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900252", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:PJ, author = "Anonymous", title = "Pages 101--184 ({June 1985})", journal = j-COMPUT-SECUR, volume = "4", number = "2", pages = "??--??", month = jun, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:25 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:EOA, author = "Harold Joseph Highland", title = "Editorial: {Office} automation {\em or} on the value of being a dinosaur", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "185--186", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900264", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:NMIb, author = "Anonymous", title = "New members of the international board of editors", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "187--187", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900276", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1985:SCN, author = "Fred Cohen", title = "A secure computer network design", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "189--205", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900288", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Chamoux:1985:DSC, author = "J. P. Chamoux", title = "Data security and confidentiality in {Europe}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "207--210", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488590029X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pieprzyk:1985:MDI, author = "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski", title = "Modular design of information encipherment for computer systems", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "211--218", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900306", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1985:IBS, author = "Belden Menkus", title = "The impact of the {Bell} system breakup on {DP} disaster recovery planning", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "219--222", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900318", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1985:FDS, author = "Charles Cresson Wood", title = "Floppy diskette security measures", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "223--228", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488590032X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:DNC, author = "Anonymous", title = "7th {DoD\slash NBS} computer security conference", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "229--237", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900331", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:S, author = "Anonymous", title = "Securicom '85", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "238--242", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900343", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:N, author = "Anonymous", title = "Networks '84", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "242--243", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900355", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{HJH:1985:UCC, author = "HJH", title = "{U.S.} computer crime legislation highlighted in special report", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "245--246", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900367", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{HJH:1985:BRK, author = "HJH", title = "Book Review: {{\booktitle{Kahn on codes: Secrets of the new cryptology}}: David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, \$19.95}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "247--247", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900379", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{HJH:1985:BRM, author = "HJH", title = "Book Review: {{\booktitle{Managing risk: a computer-aided strategy}}: John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, \$18.95}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "247--248", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900380", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1985:BRS, author = "Charles Cresson Wood", title = "Book Review: {{\booktitle{Security for computer networks}}: D. W. Davies and W. L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, \$19.50}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "248--249", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900392", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{EHH:1985:BRT, author = "EHH", title = "Book Review: {{\booktitle{Transborder data flows: access to the international on-line data-base market}}: Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00\slash {US} \$28.75}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "249--249", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900410", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{HJH:1985:BRC, author = "HJH", title = "Book Review: {{\booktitle{Communication regulation and international business}}: Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00\slash US \$46.25}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "249--249", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900409", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{EHH:1985:PSC, author = "EHH", title = "Proceedings of the seventh computer security group conference: {Washington: US Government Printing Office}, 1984 --- 776-101\slash 1027. 115 pages", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "249--250", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900422", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:ARAc, author = "Anonymous", title = "Abstract of recent articles and literature", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "251--263", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900434", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "265--266", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900446", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:PS, author = "Anonymous", title = "Pages 185--266 ({September 1985})", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "??--??", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1985:Ec, author = "Harold Joseph Highland", title = "Editorial", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "267--268", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900458", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanEck:1985:ERV, author = "Wim van Eck", title = "Electromagnetic radiation from video display units: an eavesdropping risk?", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "269--286", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488590046X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wong:1985:CCR, author = "Ken Wong", title = "Computer crime --- Risk management and computer security", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "287--295", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900471", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pieprzyk:1985:DPK, author = "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski", title = "Design of public key cryptosystems using idempotent elements", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "297--308", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900483", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{deBruyne:1985:SVU, author = "P. de Bruyne", title = "Signature verification using holistic measures", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "309--315", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900495", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{duCroix:1985:DSA, author = "A. J. du Croix", title = "Data sharing and access protection in business system 12", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "317--323", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900501", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Voydock:1985:SMT, author = "Victor L. Voydock and Stephen T. Kent", title = "Security mechanisms in a transport layer protocol", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "325--341", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900513", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:SS, author = "Anonymous", title = "Systems Security", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "343--347", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900525", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:ARAd, author = "Anonymous", title = "Abstracts of Recent Articles and Literature", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "349--362", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900537", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:Cd, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "363--364", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900549", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:SIV, author = "Anonymous", title = "Subject index to volume 4", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "365--366", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900550", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:AIV, author = "Anonymous", title = "Author index to volume 4", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "367--367", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900562", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1985:PD, author = "Anonymous", title = "Pages 267--367 ({December 1985})", journal = j-COMPUT-SECUR, volume = "4", number = "4", pages = "??--??", month = dec, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ILa, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "1--1", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901021", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:NMI, author = "Anonymous", title = "New member of the international board of editors", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "2--2", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901033", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:NPR, author = "Anonymous", title = "News from the Peoples {Republic} of {China}", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "3--3", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901045", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:D, author = "Anonymous", title = "The demise of the {DES}", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "3--4", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901057", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:TWa, author = "Anonymous", title = "Technology watch", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "4--6", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901069", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:IS, author = "Anonymous", title = "{IFIP\slash Sec} '86", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "6--7", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901070", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PSM, author = "Anonymous", title = "Physical security of microcomputers and terminals", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "7--8", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901082", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:MMC, author = "Anonymous", title = "Microcomputer-mainframe communications link", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "8--8", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901094", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:DOD, author = "Anonymous", title = "Don't overlook data compression", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "8--9", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/datacompression.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901100", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:WFF, author = "Anonymous", title = "Wanted: Floods, fires, disasters, etc.", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "10--10", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901112", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1986:WDW, author = "Bernard P. Zajac", title = "What to do when you have reason to believe your computer has been compromised", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "11--16", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901124", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kinnon:1986:ASI, author = "A. Kinnon and R. H. Davis", title = "Audit and security implications of electronic funds transfer", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "17--23", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901136", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Goeltz:1986:W, author = "Ted Goeltz", title = "Why not {DES}?", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "24--27", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901148", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Harper:1986:ICL, author = "Robert M. Harper", title = "Internal control in local area networks: an accountant's perspective", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "28--35", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690115X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vandenAssem:1986:CPA, author = "R. van den Assem and W. J. van Elk", title = "A chosen-plaintext attack on the {Microsoft BASIC} protection", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "36--45", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901161", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1986:HCM, author = "R. Paans and I. S. Herschberg", title = "How to control {MVS} user supervisor calls", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "46--54", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901173", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "55--67", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901185", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Owen:1986:CSI, author = "Kenneth Owen", title = "Computer security: {IFIP} addresses the practical issues", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "68--72", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901197", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:TSR, author = "Anonymous", title = "{TC} 11 status report", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "72--73", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901203", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoving:1986:SST, author = "Per Hoving", title = "System security: the technical challenge", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "74--79", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901215", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "80--82", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901227", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "ifc--ifc", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690101X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PM, author = "Anonymous", title = "Pages 1--82 ({March 1986})", journal = j-COMPUT-SECUR, volume = "5", number = "1", pages = "??--??", month = mar, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ILb, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "83--83", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901239", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Essen:1986:NMI, author = "Johan Essen", title = "New member of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "84--84", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901240", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ERRa, author = "Harold Joseph Highland", title = "Electromagnetic radiation revisited", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "85--93", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901252", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:BDT, author = "Anonymous", title = "{``Back door''} trespassing", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "94--94", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901264", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:TWb, author = "Anonymous", title = "Technology watch", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "94--97", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901276", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:SSR, author = "Anonymous", title = "Some suggested reading", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "97--97", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901288", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:SR, author = "Anonymous", title = "Security reminders", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "97--98", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690129X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:CPC, author = "Anonymous", title = "On cryptographic protection of capabilities", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "98--99", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901306", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:SN, author = "Anonymous", title = "On a serious (?) note", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "99--99", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901318", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ware:1986:EPIa, author = "Willis H. Ware", title = "Emerging privacy issues", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "101--113", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690132X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1986:SMP, author = "Charles Cresson Wood and Howard M. Zeidler", title = "Security modules: Potent information security system components", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "114--121", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901331", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoebeke:1986:CSP, author = "L. Hoebeke", title = "Computer security --- Prevention: Lessons from the operation of a nuclear power plant", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "122--127", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901343", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanderLans:1986:DSR, author = "R. F. van der Lans", title = "Data security in a relational database environment", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "128--134", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901355", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Richards:1986:RMK, author = "Roy Martin Richards and Jan Yestingsmeier", title = "Risk management --- a key to security in the electronic funds transfer system", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "135--140", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901367", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bishop:1986:PCS, author = "Matt Bishop", title = "A pauper's callback scheme", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "141--144", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901379", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jansen:1986:KSR, author = "C. J. A. Jansen", title = "On the key storage requirements for secure terminals", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "145--149", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901380", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "150--164", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901392", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:WSR, author = "Anonymous", title = "{WG} 11:4 status report", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "165--166", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901409", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1986:DSR, author = "John M. Carroll and Helmut J{\"u}rgensen", title = "Design of a secure relational data base", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--167", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901422", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Faak:1986:SVH, author = "Viiveke F{\aa}k", title = "Software versus hardware encryption --- Is there any difference today?", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--167", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901434", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Power:1986:AHE, author = "June M. Power and Steve R. Wilbur", title = "Authentication in a heterogeneous environment", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--167", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901458", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tompkins:1986:ISAa, author = "Frederick G. Tompkins and Russel Rice", title = "Intergrating security activities into the software development life cycle and the software quality assurance process", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--167", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901446", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ware:1986:EPIb, author = "Willis H. Ware", title = "Emerging privacy issues", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--167", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901410", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Worthington:1986:IDS, author = "T. K. Worthington and J. J. Chainer and J. D. Willford and S. C. Gunderson", title = "{IBM} dynamic signature verification", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "167--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690146X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Beatson:1986:DOA, author = "John G. Beatson", title = "Development and organization of the audit and security functions", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901495", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Doswell:1986:ACS, author = "Roger T. Doswell", title = "The audit, control and security of the project life cycle --- Pre-implementation stage", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901513", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ekerbrink:1986:SET, author = "Ivan Ekerbrink", title = "Security of electronic transactions", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901483", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kingston:1986:SSB, author = "Peter P. C. H. Kingston and Martin Goulbourn", title = "Security for small business computers", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901525", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kugler:1986:CPI, author = "Han-J{\"u}rgen Kugler", title = "Concepts of protection in the {IFIP WG 2.7} reference model for command and response languages", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901471", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tener:1986:DSS, author = "William T. Tener", title = "Decision support systems --- a necessity for effective auditing of controls", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--168", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901501", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Stanley:1986:ECC, author = "Philip M. Stanley", title = "Educating computer crime investigators", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "168--169", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901537", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Davies:1986:HUS, author = "Donald W. Davies", title = "How to use the {DES} safely", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "169--169", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901562", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Murine:1986:PRS, author = "Gerald E. Murine", title = "Producing reliable, secure software", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "169--169", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901549", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1986:ETS, author = "Charles Cresson Wood", title = "Establishing technical systems security standards at a large multinational bank", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "169--169", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901550", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:Cb, author = "Anonymous", title = "{CRYPTO} '85", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "170--176", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901574", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "177--178", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886901586", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PJ, author = "Anonymous", title = "Pages 83--178 ({June 1986})", journal = j-COMPUT-SECUR, volume = "5", number = "2", pages = "??--??", month = jun, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:27 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ILc, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "179--180", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900015", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ERRb, author = "Harold Joseph Highland and Viiveke F{\aa}k", title = "Electromagnetic radiation revisited, part {II}", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "181--184", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900027", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:MTT, author = "Anonymous", title = "Modern technology tools for user authentication", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "184--185", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900039", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:MAC, author = "Anonymous", title = "Microcomputer access control limited by password, time, day, and\slash or program", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "185--186", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900040", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:BL, author = "Anonymous", title = "In brief \ldots{}", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "187--188", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900052", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:MAT, author = "Anonymous", title = "Microcomputer audit trails made easy", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "188--189", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900064", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:RAP, author = "Anonymous", title = "Risk analysis package", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "189--190", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900076", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:CBa, author = "Anonymous", title = "Coffee break", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "190--190", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900088", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:HDD, author = "Anonymous", title = "Hard disk disaster recovery tool", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "190--192", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690009X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1986:EIT, author = "Charles Cresson Wood", title = "Establishing internal technical systems security standards", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "193--200", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900106", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Beatson:1986:MEA, author = "John G. Beatson", title = "Managing the {EDP} audit and security functions", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "201--206", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900118", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Richards:1986:ICR, author = "Roy Martin Richards", title = "Insuring computer risks", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "207--210", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690012X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoffman:1986:SVC, author = "Lance J. Hoffman and Lucy M. Moran", title = "Societal vulnerability to computer system failures", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "211--217", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900131", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tompkins:1986:ISAb, author = "Frederick G. Tompkins and Russell S. Rice", title = "Integrating security activities into the software development life cycle and the software quality assurance process", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "218--242", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900143", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pluimakers:1986:ACS, author = "G. M. J. Pluimakers and J. van Leeuwen", title = "Authentication: a concise survey", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "243--250", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900155", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lapid:1986:AHT, author = "Yeheskel Lapid and Niv Ahituv and Seev Neumann", title = "Approaches to handling {``Trojan Horse''} threats", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "251--256", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900167", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:ARAc, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "257--272", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900179", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:Cd, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "273--275", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900180", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PS, author = "Anonymous", title = "Pages 179--275 ({September 1986})", journal = j-COMPUT-SECUR, volume = "5", number = "3", pages = "??--??", month = sep, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:ILd, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "277--278", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900416", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:AVA, author = "Anonymous", title = "Another view about passwords", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "279--281", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900428", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:R, author = "Anonymous", title = "The {DES} revisited", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "281--282", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690043X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:RRP, author = "Anonymous", title = "{RAM}-resident program security threat", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "282--285", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900441", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:AMS, author = "Anonymous", title = "Advanced microcomputer security system", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "285--287", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900453", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:III, author = "Anonymous", title = "{International Information Integrity Institute}", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "287--287", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900465", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:LLN, author = "Anonymous", title = "The lure of large numbers", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "287--287", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900477", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:RE, author = "Anonymous", title = "Remember the {Enigma}!", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "288--289", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900489", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tener:1986:DCD, author = "William T. Tener", title = "Detection of control deterioration using decision support systems", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "290--295", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900490", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Rutledge:1986:SIC, author = "Linda S. Rutledge and Lance J. Hoffman", title = "A survey of issues in computer network security", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "296--308", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900507", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Stanley:1986:CCI, author = "Philip M. Stanley", title = "Computer crime investigation and investigators", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "309--313", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900519", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Karger:1986:ADA, author = "Paul A. Karger", title = "Authentication and discretionary access control in computer networks", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "314--324", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900520", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ekebrink:1986:DST, author = "Ivan Ekebrink", title = "Data security in terminalized system", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "325--327", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900532", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Alagar:1986:HAT, author = "V. S. Alagar", title = "A human approach to the technological challenges in data security", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "328--335", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900544", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Murine:1986:SSI, author = "Gerald E. Murine", title = "Secure software's impact on reliability", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "336--339", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900556", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1986:HMM, author = "Harold Joseph Highland", title = "How to modify a microcomputer operating system for added security", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "340--343", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900568", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Erdem:1986:HCO, author = "Hilmi Erdem", title = "Host cryptographic operations: a software implementation", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "344--346", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690057X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Leahy:1986:PP, author = "Patrick Leahy", title = "Privacy and progress", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "347--349", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900581", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:ARAd, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "350--359", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900593", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PIE, author = "Anonymous", title = "Protection of information in electronic systems", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "360--360", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488690060X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:ERS, author = "Anonymous", title = "Electronic record systems and individual privacy", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "361--362", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900611", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:Ce, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "363--364", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900623", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:SIV, author = "Anonymous", title = "Subject index to volume 5", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "365--366", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900635", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:AIV, author = "Anonymous", title = "Author index to volume 5", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "367--368", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404886900647", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1986:PD, author = "Anonymous", title = "Pages 277--368 ({December 1986})", journal = j-COMPUT-SECUR, volume = "5", number = "4", pages = "??--??", month = dec, year = "1986", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:28 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:ILa, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "1--3", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901118", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:NMI, author = "Anonymous", title = "New members of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "4--7", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790112X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CVS, author = "Harold Joseph Highland", title = "Computer viruses and sudden death!", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "8--10", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901131", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:TWP, author = "Anonymous", title = "Technology watch --- Personal authentication devices", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "10--11", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901143", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:IS, author = "Anonymous", title = "{IFIP\slash Sec}", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "12--12", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901155", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:EEF, author = "Anonymous", title = "Electromagnetic eavesdropping --- Fact of fantasy?", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "12--14", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901167", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:OMN, author = "Anonymous", title = "Other meetings of note", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "14--14", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901180", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:RAT, author = "Anonymous", title = "Report about {TC} 11 working groups", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "14--14", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901179", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SR, author = "Anonymous", title = "Security reminder", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "15--15", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901192", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:P, author = "Anonymous", title = "{DOS} postscript", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "15--16", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901209", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Moulton:1987:HSC, author = "Rolf T. Moulton", title = "How to supervise and control {I/S} Security Officers and Auditors", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "17--21", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901210", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1987:CVT, author = "Fred Cohen", title = "Computer viruses: Theory and experiments", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "22--35", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901222", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Faak:1987:CMM, author = "Viiveke F{\aa}k", title = "Crypto management made manageable --- Demands on crypto equipment design", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "36--40", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901234", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Power:1987:AHE, author = "June M. Power and Steve R. Wilbur", title = "Authentication in a heterogeneous environment", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "41--48", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901246", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Solarz:1987:CRE, author = "Artur Solarz", title = "Computer-related embezzlement", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "49--53", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901258", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Longley:1987:ESA, author = "Dennis Longley", title = "Expert systems applied to the analysis of key management schemes", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "54--67", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790126X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kingston:1987:SMU, author = "Peter P. C. H. Kingston and Martin Goulbourn", title = "Security for microcomputers used in small business", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "68--72", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901271", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:DPV, author = "Harold Joseph Highland", title = "Data physician --- a virus protection program", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "73--79", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901283", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "80--90", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901295", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SS, author = "Anonymous", title = "System Security 1986", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "91--93", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901301", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SEC, author = "Anonymous", title = "Second {European} Conference on Computer Audit, Control and Security", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "94--94", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901313", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "95--96", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901325", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "ifc--ifc", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901106", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PF, author = "Anonymous", title = "Pages 1--96 ({February 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "1", pages = "??--??", month = feb, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:ILb, author = "Harold Joseph Highland", title = "In this issue \ldots{}", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "97--98", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900745", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:HSY, author = "Harold Joseph Highland", title = "How secure are your encryption keys?", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "99--100", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900757", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:RPI, author = "Harold Joseph Highland", title = "The {DES} revisited --- Part {II}", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "100--101", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900769", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CSN, author = "Harold Joseph Highland", title = "Computer security: a new focus at the {National Bureau of Standards}", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "102--103", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900770", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:TW, author = "Harold Joseph Highland", title = "Technology watch", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "103--108", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900782", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CCS, author = "Harold Joseph Highland", title = "The charade of computer security", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "108--109", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900794", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:RNR, author = "Harold Joseph Highland", title = "Random notes and reports", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "109--110", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900800", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Saari:1987:CCN, author = "Juhani Saari", title = "Computer crime --- numbers lie", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "111--117", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900812", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohe:1987:PAI, author = "Fred Cohe", title = "Protection and administration of information networks with partial orderings", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "118--128", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900824", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Schweitzer:1987:HSF, author = "James A. Schweitzer", title = "How security fits in --- a management view: Security is an essential for quality information", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "129--132", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900836", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Herschberg:1987:HC, author = "I. S. Herschberg", title = "The hackers' comfort", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "133--138", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900848", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bui:1987:CEM, author = "Tung Bui and Taracad R. Sivasankaran", title = "Cost-effectiveness modeling for a decision support system in computer security", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "139--151", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790085X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ahituv:1987:VAI, author = "Niv Ahituv and Yeheskel Lapid and Seev Neumann", title = "Verifying the authentication of an information system user", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "152--157", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900861", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pfitzmann:1987:NUO, author = "Andreas Pfitzmann and Michael Waidner", title = "Networks without user observability", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "158--166", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900873", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1987:ISI, author = "Ronald Paans", title = "{IFIP\slash Sec'86}: Information security: the challenge", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "167--171", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900885", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1987:E, author = "Ronald Paans", title = "{ECOMA-14}", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "172--172", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900897", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1987:FEC, author = "Ronald Paans", title = "First {European} Conference on Computer Audit, Control and Security", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "173--176", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900903", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lee:1987:PAC, author = "J. A. N. Lee and Gerald Segal", title = "Positive alternatives to computer misuse: a report of the proceedings of an {ACM} panel on hacking", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "177--179", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900915", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "180--190", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900927", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "191--192", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900939", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PAa, author = "Anonymous", title = "Pages 97--192 ({April 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "2", pages = "??--??", month = apr, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:29 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:Ea, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "193--194", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900940", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:DES, author = "Harold Joseph Highland", title = "Data encryption standard {II}?", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "195--196", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900952", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:RB, author = "Harold Joseph Highland", title = "Report from {Beijing}", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "196--198", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900964", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:IS, author = "Harold Joseph Highland", title = "Information sources", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "198--199", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900976", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:EP, author = "Harold Joseph Highland", title = "Encryption package", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "199--202", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900988", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:UDC, author = "Harold Joseph Highland", title = "{US} data controls", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "202--203", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790099X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CSL, author = "Harold Joseph Highland", title = "Computer security and law", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "203--205", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901003", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CC, author = "Harold Joseph Highland", title = "Cipher cracking", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "205--205", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901015", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Rihaczek:1987:TOC, author = "Karl Rihaczek", title = "{TeleTrusT}-{OSIS} and communication security", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "206--218", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901027", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1987:DAD, author = "Fred Cohen", title = "Design and administration of distributed and hierarchical information networks under partial orderings", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "219--228", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901039", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:HEM, author = "Harold Joseph Highland", title = "How to evaluate microcomputer encryption software and hardware", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "229--244", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901040", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Dwyer:1987:MLS, author = "Patricia A. Dwyer and George D. Jelatis and Bhavani M. Thuraisingham", title = "Multi-level security in database management systems", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "245--251", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901052", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Johnstone:1987:KUF, author = "Richard J. Johnstone", title = "Key updating flags in {EFT}-{POS} security systems", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "252--260", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901064", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanHeurck:1987:TBS, author = "Ph. van Heurck", title = "{TRASEC}: {Belgian} security system for electronic funds transfers", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "261--268", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901076", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAc, author = "Anonymous", title = "Abstracts of recent articles and literature: Computer law", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "269--281", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887901088", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "282--283", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790109X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PJ, author = "Anonymous", title = "Pages 193--283 ({June 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "3", pages = "??--??", month = jun, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:EL, author = "Harold Joseph Highland", title = "From the editor \ldots{}", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "285--287", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900605", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:WYR, author = "Harold Joseph Highland", title = "Would you report a suspected data crime to the authorities?", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "288--295", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900617", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:TWA, author = "Anonymous", title = "Technology watch --- access control to mainframe", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "295--296", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900629", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:RA, author = "Anonymous", title = "Risk assessment", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "297--298", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900630", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:VLR, author = "Anonymous", title = "Very light reading", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "298--299", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900642", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1987:SEU, author = "John M. Carroll", title = "Strategies for extending the useful lifetime of {DES}", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "300--313", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900654", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1987:ISS, author = "Charles Cresson Wood", title = "Information systems security: Management success factors", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "314--320", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900666", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pozzo:1987:ACC, author = "Maria M. Pozzo and Terence E. Gray", title = "An approach to containing computer viruses", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "321--331", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900678", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1987:DPI, author = "Fred Cohen", title = "Design and protection of an information network under a partial ordering: a case study", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "332--338", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790068X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mitchell:1987:CRK, author = "Chris Mitchell and Fred Piper", title = "The cost of reducing key-storage requirements in secure networks", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "339--341", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900691", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jung:1987:IRC, author = "Achim Jung", title = "Implementing the {RSA} cryptosystem", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "342--350", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900708", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Faak:1987:RWC, author = "Viiveke F{\aa}k", title = "Report from the working conference on ``the {Crypto User's Handbook}'' held in {Stockholm, October 22--23, 1986 by IFIP WG 11:4}", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "351--351", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790071X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAd, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "352--362", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900721", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Cd, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "363--364", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900733", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PAb, author = "Anonymous", title = "Pages 285--364 ({August 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "4", pages = "??--??", month = aug, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:30 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:Eb, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "365--367", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900010", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:SFT, author = "Harold Joseph Highland", title = "Secure fax transmission", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "368--370", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900022", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:HSE, author = "Anonymous", title = "High-speed encrypted storage\slash backup", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "370--373", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900034", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:MAU, author = "Anonymous", title = "Message authentication using the {RSA}", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "373--376", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900046", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SRP, author = "Anonymous", title = "Secure remote power-on modem", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "376--378", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900058", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:WIS, author = "Anonymous", title = "Write it down safely", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "379--379", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790006X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SSC, author = "Anonymous", title = "Speedier secure communications", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "379--380", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900071", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:LI, author = "Anonymous", title = "Lock it up", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "380--381", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900083", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:RN, author = "Anonymous", title = "Random notes", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "381--382", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900095", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:GC, author = "Anonymous", title = "Guest comments", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "382--384", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900101", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Spender:1987:ICU, author = "J-C. Spender", title = "Identifying computer users with authentication devices (tokens)", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "385--395", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900113", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fernandez:1987:ACA, author = "C. Fern{\'a}ndez and A. Vaquero and J. M. Troya and J. M. S{\'a}nchez", title = "Automating the computation of authenticators for interbank telex messages", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "396--402", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900125", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1987:CSL, author = "R. Paans and I. S. Herschberg", title = "Computer security: the long road ahead", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "403--416", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900137", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Post:1987:IOS, author = "Gerald V. Post", title = "Improving operating system security", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "417--425", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900149", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:NCC, author = "Anonymous", title = "{NTIS} computers, control and information theory", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "426--431", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900150", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAe, author = "Anonymous", title = "Abstracts of recent articles and literature: Computer law", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "432--441", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900162", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Ce, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "442--443", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900174", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PO, author = "Anonymous", title = "Pages 365--443 ({October 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "5", pages = "??--??", month = oct, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:Ec, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "445--446", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900186", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:NMI, author = "Harold Joseph Highland", title = "New member of the International Board of {Editors}", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "447--447", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900198", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:CAM, author = "Harold Joseph Highland", title = "Computer abuse and managerial response", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "448--448", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900204", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:DCS, author = "Harold Joseph Highland", title = "Data cartridge for secure data", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "449--451", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900216", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:PR, author = "Harold Joseph Highland", title = "Passwords revisited", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "451--452", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900228", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:OAS, author = "Harold Joseph Highland", title = "{Office} automation security", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "452--457", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488790023X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:TLC, author = "Harold Joseph Highland", title = "Tempest over leaking computers", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "457--458", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900241", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:HDR, author = "Harold Joseph Highland", title = "Hard disk recovery tools", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "458--462", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900253", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1987:RN, author = "Harold Joseph Highland", title = "Random notes", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "463--463", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900265", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Smith:1987:AUW, author = "Sidney L. Smith", title = "Authenticating users by word association", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "464--470", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900277", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Baird:1987:MC, author = "Bruce J. Baird and Lindsay L. Baird and Ronald P. Ranauro", title = "The moral cracker?", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "471--478", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900289", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Thuraisingham:1987:SCR, author = "M. B. Thuraisingham", title = "Security checking in relational database management systems augmented with inference engines", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "479--492", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900290", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Guarro:1987:PPL, author = "Sergio B. Guarro", title = "Principles and procedures of the {LRAM} approach to information systems risk analysis and management", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "493--504", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900307", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1987:CCI, author = "Fred Cohen", title = "A cryptographic checksum for integrity protection", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "505--510", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900319", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1987:HIS, author = "Charles Cresson Wood", title = "The human immune system as an information systems security reference model", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "511--516", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900320", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:ARAf, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "517--526", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900332", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:Cf, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "527--527", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900344", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:SIV, author = "Anonymous", title = "Subject index to volume 6", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "528--529", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900356", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:AIV, author = "Anonymous", title = "Author index to volume 6", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "530--531", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404887900368", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1987:PD, author = "Anonymous", title = "Pages 445--531 ({December 1987})", journal = j-COMPUT-SECUR, volume = "6", number = "6", pages = "??--??", month = dec, year = "1987", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:31 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:E, author = "Anonymous", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "2--2", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904877", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "2--2", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904865", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CHV, author = "Harold Joseph Highland", title = "Case history of a virus attack", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "3--5", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904889", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:EAE, author = "Harold Joseph Highland", title = "Encryption, attacks and ethics", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "5--6", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904890", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HPMa, author = "Harold Joseph Highland", title = "How to protect a microcomputer system", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "6--7", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904907", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CCC, author = "Harold Joseph Highland", title = "{Chernobyl} computer communications", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "7--9", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904919", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:EI, author = "Harold Joseph Highland", title = "Electromagnetic interference", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "9--10", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904920", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:IS, author = "Harold Joseph Highland", title = "{IFIP\slash Sec '88}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "10--10", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904932", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:YI, author = "Harold Joseph Highland", title = "For your information", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "10--11", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904944", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PR, author = "Harold Joseph Highland", title = "Product reviews", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "13--18", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904956", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Courtney:1988:APS, author = "Robert H. Courtney", title = "Another perspective on sensitive but unclassified data", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "19--23", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904968", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HSF, author = "Harold Joseph Highland", title = "How secure are fiber optics communications?", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "25--26", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890497X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SIT, author = "Harold Joseph Highland", title = "Secretdisk {II} --- transparent automatic encryption", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "27--34", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904981", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1988:DCL, author = "Bernard P. Zajac", title = "Dial-up communication lines: Can they be secured?", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "35--36", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888904993", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PAO, author = "Harold Joseph Highland", title = "Program aids for office automation security", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "37--43", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905007", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRa, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "45--46", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905019", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1988:GSD, author = "Belden Menkus", title = "Getting started in data processing disaster recovery", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "47--52", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905020", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Amsel:1988:NSA, author = "Ellen Amsel", title = "Network security and access controls", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "53--57", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905032", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ahituv:1988:PSD, author = "Niv Ahituv and Yeheskel Lapid and Seev Neumann", title = "Protecting statistical databases against retrieval of private information", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "59--63", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905044", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Christoffersson:1988:MAE, author = "Per Christoffersson", title = "Message authentication and encryption combined", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "65--71", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905056", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lunt:1988:ELC, author = "Teresa F. Lunt and Dorothy E. Denning and Roger R. Schell and Mark Heckman and William R. Shockley", title = "Element-level classification with A1 assurance", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "73--82", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905068", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Salomaa:1988:PKC, author = "Arto Salomaa", title = "A public-key cryptosystem based on language theory", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "83--87", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890507X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NLK, author = "Anonymous", title = "New locks and keys for electronic information", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "89--93", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905081", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCa, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "95--96", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905093", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WWRa, author = "Anonymous", title = "World-wide reports on developments in computer security", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "97--100", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890510X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ADD, author = "Anonymous", title = "Anatomy of a disaster: {David Davies}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "101--101", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905159", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:AUS, author = "Anonymous", title = "{Apple} urges separate copyright registration of screen displays: {Scott} Mace", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "101--101", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905111", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:FSP, author = "Anonymous", title = "Fighting software piracy", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "101--101", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905135", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:GSP, author = "Anonymous", title = "Guidelines or standards! {Part} one: {Yvo Henniker-Heaton}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "101--101", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905147", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:JOP, author = "Anonymous", title = "{Justice} ordered to pay software licensing fees: {Tim McGraw}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "101--101", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905123", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:BRCa, author = "Anonymous", title = "Book Review: {{\booktitle{Computer crime --- What to do before it happens}}: Bernard P. Zajac, Jr.}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905160", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:GCH, author = "Anonymous", title = "{German} computer hobbyists rifle {NASA}'s files: {Serge Schmemann}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905214", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:GUD, author = "Anonymous", title = "1-2-3 to go unprotected: {Douglas Barney}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905172", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HRU, author = "Anonymous", title = "{HK} raid uncovers {Autodesk} pirates", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905202", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LPN, author = "Anonymous", title = "{Lotus} promises new releases, no protection: {Virginia} Dudek", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905184", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MCS, author = "Anonymous", title = "{MIS} computer security slacking: {June Altman}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--102", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905196", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NSC, author = "Anonymous", title = "{NASA} says classified data not breached: {Rick Vizachero}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "102--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905226", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PED, author = "Anonymous", title = "Processing encrypted data: {Niv Ahituv, Yeheskel Lapid, and Seev Neumann}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890524X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PPI, author = "Anonymous", title = "Public policy and internal privacy codes: {Tom Riley}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905263", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NMB, author = "Anonymous", title = "{``Never mind!''} businesses cool off on site license issue: {Ed Scannell}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905238", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:TPD, author = "Anonymous", title = "Tactical planning for data security management: {Sandra M. Mann Lambert}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905251", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lewis:1988:WPP, author = "Peter H. Lewis", title = "When the password is a passkey", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905287", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Weber:1988:EAP, author = "Ron Weber", title = "Has {EDP} audit progressed in the last 15 years?", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--103", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905275", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:RSCa, author = "Anonymous", title = "Report says computers spy on 7 million workers in {US}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "103--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905299", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bozman:1988:ISR, author = "Jean S. Bozman", title = "{IBM} slow to remedy leaky {DB2} security", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905330", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bozman:1988:USF, author = "Jean S. Bozman", title = "Users see flaws in audit trails, access authority", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905342", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1988:ACP, author = "John M. Carroll and Lynda Robbins", title = "The automated cryptananysis of polyalphabetic ciphers", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905354", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hargrove:1988:SIA, author = "Robert Hargrove", title = "Secure information is accurate information", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905329", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hunter:1988:DRN, author = "Philip Hunter", title = "Disaster recovery needed", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905305", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{McDonald:1988:NDU, author = "Evelyn C. McDonald", title = "{North} didn't understand delete function", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "104--104", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905317", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bennett:1988:AEA, author = "John Bennett", title = "Analysis of the encryption algorithm used in the {WordPerfect} word processing program", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "chttp://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905366", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Goff:1988:IUT, author = "Leslie Goff", title = "{IBM} users told data files could have legal pitfalls", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905408", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Horwitt:1988:OSS, author = "Elisabeth Horwitt", title = "{OSI} security system revealed", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905378", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hunter:1988:CTM, author = "Philip Hunter", title = "Computer trouble makes {British} skies unfriendly", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890538X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jones:1988:SR, author = "Stephen Jones and {Senior Editors}", title = "{LA} sites rocked", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905391", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Munro:1988:NRM, author = "Neil Munro", title = "New risk management lab will tackle security needs", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--105", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890541X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Grimm:1988:DEH, author = "Vanessa Jo Grimm", title = "Data errors hurt {State Department} system", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "105--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905421", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HMD, author = "Anonymous", title = "{Hospital}'s medical data held in strict security", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905433", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SIC, author = "Anonymous", title = "Security issues concern {NSA}, vendors", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905457", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Betts:1988:ESG, author = "Mitch Betts", title = "Encryption standard to get reprieve", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905470", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Chandler:1988:LIN, author = "Harriette L. Chandler", title = "{LANS} introduce new security issues", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905469", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sopko:1988:FHD, author = "Sandra Sopko", title = "Fire and humidity: Data safes protect against both", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--106", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905445", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wong:1988:SOA, author = "Ken Wong", title = "Security and office automation", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "106--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905482", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCL, author = "Anonymous", title = "Development of confidence limits by pivotal functions for estimating software reliability", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905500", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:FTC, author = "Anonymous", title = "Fault tolerant computers and multiprocessing. {January 1985--June 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905494", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{ben-Aaron:1988:TCC, author = "Diana ben-Aaron and Lee Green", title = "{Today}'s computer crime: the threat from within", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905548", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Crockett:1988:ASU, author = "Barton Crockett and Cassimir J. Medford", title = "After the street's unforgettable week all info systems are (mostly) go", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905512", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hunter:1988:LSC, author = "Philip Hunter", title = "In {London}, stocks up and computers down", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905536", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ko:1988:JMW, author = "Dorothy Ko", title = "In {Japan}, {MIS} weathers the storm easily", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "107--107", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905524", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Miles:1988:PPP, author = "J. B. Miles", title = "Public-private partners work on secure protocols", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "108--108", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905585", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Miles:1988:USC, author = "J. B. Miles", title = "Unclassified security calls for a `friendly' approach", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "108--108", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905573", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Munro:1988:ETD, author = "Neil Munro", title = "Expert tells {DoD} it needs training, not more tempest", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "108--108", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905561", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Perry:1988:SSA, author = "William E. Perry", title = "Software still is arriving with those annoying bugs", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "108--108", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890555X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:APa, author = "Anonymous", title = "Addresses of publications", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "108--110", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905597", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "111--111", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905603", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PF, author = "Anonymous", title = "Pages 1--111 ({February 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "1", pages = "??--??", month = feb, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:32 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:Ea, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "114--114", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903203", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LEa, author = "Anonymous", title = "Letters to the editor", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "115--116", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903215", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:RBB, author = "Anonymous", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "117--127", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903227", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bound:1988:DST, author = "William A. J. Bound", title = "Discussing security with top management", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "129--130", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903239", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1988:POH, author = "Bernard P. Zajac", title = "Personnel: the other half of data security", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "131--132", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903240", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1988:UUP, author = "Belden Menkus", title = "Understanding the use of passwords", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "132--136", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903252", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1988:PMM, author = "G. J. Bologna", title = "Pitfalls in measuring {MIS} performance", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "137--138", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903264", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Murray:1988:AEC, author = "W. H. Murray", title = "The application of epidemiology to computer viruses", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "139--145", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903276", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AVA, author = "Harold Joseph Highland", title = "Anatomy of a virus attack", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "145--150", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903288", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Faak:1988:WVV, author = "Viiveke F{\aa}k", title = "Are we vulnerable to a virus attack?. {A} report from {Sweden}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "151--155", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890329X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:VDA, author = "Anonymous", title = "Virus defense alert", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "156, 158", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903306", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:OVP, author = "Harold Joseph Highland", title = "An overview of 18 virus protection products", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "157--161", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903318", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HCC, author = "Harold Joseph Highland", title = "How to combat a computer virus", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "157, 161--163", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890332X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRb, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "165--166", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903331", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1988:ICV, author = "Fred Cohen", title = "On the implications of computer viruses and methods of defense", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "167--184", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903343", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Straub:1988:OSC, author = "Detmar W. Straub", title = "Organizational structuring of the computer security function", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "185--195", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903355", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Herschberg:1988:MTH, author = "I. S. Herschberg", title = "Make the tigers hunt for you", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "197--203", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903367", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCb, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "205--206", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903379", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WWRb, author = "Anonymous", title = "World-wide reports on developments in computer security: Part {II}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "207--209", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903380", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WSa, author = "Anonymous", title = "What others are saying", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "210--212", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903392", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ASV, author = "Anonymous", title = "Aftershocks for {Silicon Valley}: {{\em {Richard} Raysman and Peter Brown}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--213", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903409", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCTa, author = "Anonymous", title = "{Dickerson} center of tug-of-war: {{\em Stephen Jones}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--213", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903422", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HLR, author = "Anonymous", title = "Hold that Lawsuit: {{\em Rosemary Hamilton}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--213", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903446", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LPC, author = "Anonymous", title = "Legal protection for computer software", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--213", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903410", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MBS, author = "Anonymous", title = "{Microsoft}, {Borland} Settle {Dickerson} Case: {{\em Rachel Parker}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--213", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903434", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CSS, author = "Anonymous", title = "Computer security shift is approved by {Senate}: {{\em {Linda} Greenhouse}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "213--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903458", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HKF, author = "Anonymous", title = "{Hong Kong} focus: {{\em Michael D. Pendleton}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903483", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hughes:1988:ARA, author = "Pamela L. Hughes", title = "Abstract of recent articles and literature: Radio frequency interfaces --- Myths, realities and a practical approach", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903471", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:RIA, author = "Anonymous", title = "Remote identification and authentication of computer resource users: {{\em {Ken} Weiss}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903495", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SVE, author = "Anonymous", title = "Security in the {VM} environment: {{\em {William} H. Murray}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903501", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SWL, author = "Anonymous", title = "Shrink-wrap licensing: {{\em Christopher J. Millard}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--214", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890346X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SPE, author = "Anonymous", title = "Security planning for {EFT} network systems: {{\em A. D. Davis}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "214--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903513", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CUS, author = "Anonymous", title = "Computer user surveillance: {{\em Kevin J. Fitzgerald}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903525", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:BRCb, author = "Anonymous", title = "Book Review: {{\booktitle{Computer viruses --- a secret threat}}: Rudiger Dierstein}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903537", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:H, author = "Anonymous", title = "Horatius", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903562", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ICT, author = "Anonymous", title = "Insurance and computers: the technology gap: {{\em David Davis}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903549", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MKF, author = "Anonymous", title = "{Manage\slash 38}: {{\em Kevin Fitzgerald}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--215", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903550", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:BTT, author = "Anonymous", title = "Buyers turning toward software escrow plans: {{\em Carole Patton}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "215--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903574", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CFR, author = "Anonymous", title = "Conference focuses on reduction of software risks: {{\em Darryl K. Taft}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903604", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DSP, author = "Anonymous", title = "Data security provides the key to lock out intruders: {{\em {Howard} C. Berkowitz}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903628", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:FTA, author = "Anonymous", title = "Faulty tolerance adds security to critical on-line transactions: {{\em {William} C. Grover}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903586", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HSL, author = "Anonymous", title = "How to secure a local area network: {{\em Philip C. McKinney.}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903598", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SAF, author = "Anonymous", title = "{Senate} approves funds for {DEA Tempest} equipment: {{\em Vanessa Jo Grim}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--216", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903616", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PMT, author = "Anonymous", title = "{PC}--mainframe ties hard to guard: {{\em Paula S. Stone}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "216--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890363X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ASS, author = "Anonymous", title = "{Apollo} skirts site license issue: {{\em {James} Connolly}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903690", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:BM, author = "Anonymous", title = "Battling Mediocrity", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903677", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCL, author = "Anonymous", title = "Crash course: Lessons in preventing computer downtime: {{\em {Lee} Green}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903653", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NFG, author = "Anonymous", title = "Net failures growing concern in workplace: {{\em Mark Stevens}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903641", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NNC, author = "Anonymous", title = "{NSA}, {NBS} coming together on computer security", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903689", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NWL, author = "Anonymous", title = "New wave of {LAN} security products hailed by users: {{\em {Susan} Kerr}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "217--217", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903665", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HSS, author = "Anonymous", title = "Hardware, software security devices protect {PCs} and inside information: {{\em {Robert} L. Scheier}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903720", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MAS, author = "Anonymous", title = "{MIS} assumes a shirt-sleeves approach to protecting power: {{\em Jeff Goodwin}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903756", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MSH, author = "Anonymous", title = "Most systems held fast while storm clouds grew on Wall St: {{\em {Alan} Alper}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903732", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NEW, author = "Anonymous", title = "No easy way through data-security maze, consultants say: {{\em {Robert} L. Scheier}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903719", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SLD, author = "Anonymous", title = "Is site licensing a dead issue?: {{\em Stephanie Wilkinson}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903744", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SSF, author = "Anonymous", title = "The structure of system\slash 88, a fault-tolerant computer: {{\em E. S. Harrison and E. J. Schmitt}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--218", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903707", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:UPS, author = "Anonymous", title = "Uninterruptible power supplies", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "218--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903768", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCSa, author = "Anonymous", title = "Coalition to combat software piracy: {{\em Rachel Parker}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903781", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:GYD, author = "Anonymous", title = "Guarding your data: {{\em Julie Anderson}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890377X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HPC, author = "Anonymous", title = "Hardware protection of communications ports and lines: {{\em Eugene F. Troy}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903811", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PSP, author = "Anonymous", title = "Policies for secure personal data: {Thomas B. Riley}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890380X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SCM, author = "Anonymous", title = "Security considerations for minicomputer systems acquisitions: {{\em Sandra M. Mann Lambert}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903823", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SCU, author = "Anonymous", title = "A security checklist for upper management: {{\em Jerome Lobel}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "219--219", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903793", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:AFA, author = "Anonymous", title = "{ANSI}, {Feds} address {DMBS} security: {{\em Mitch Betts}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903860", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CTL, author = "Anonymous", title = "To catch a thief: Lessons in systems security: {{\em {Michael} Ball}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903884", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CVA, author = "Anonymous", title = "The corporate view: {{\em {Alex} Kask}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903835", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:FBL, author = "Anonymous", title = "Fuss over bottom line could foil disaster recovery", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903859", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NPD, author = "Anonymous", title = "{NASD} power dip could recur: {{\em {Barton} Crockett}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903872", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WFT, author = "Anonymous", title = "Wanted: Full-time contingency planners: {{\em {David} A. Ludlum}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--220", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903847", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SSG, author = "Anonymous", title = "Security systems: Getting management to shell out: {{\em Larry Stevens}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "220--221", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903896", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DEK, author = "Anonymous", title = "Data encryption is key to safe file transmission: {{\em Lawrence E. Hughes}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "221--221", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903926", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ESNa, author = "Anonymous", title = "Expert sees national security risks in {BASIS} net: {{\em {Wayne} Madsen}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "221--221", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903902", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LGH, author = "Anonymous", title = "Loophole gives hackers access to {DEC} machines: {{\em Marlene Brown}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "221--221", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903938", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NNS, author = "Anonymous", title = "{NBS} and {NSA} stand on different sides of security: {{\em Evelyn C. MacDonald.}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "221--221", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903914", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ESV, author = "Anonymous", title = "Evaluating signature verification systems is tricky: {{\em {Rodney} Beatson}}", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "221--222", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890394X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "224--224", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888903951", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PAa, author = "Anonymous", title = "Pages 114--224 ({April 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "2", pages = "??--??", month = apr, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:33 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highlands:1988:E, author = "Dr. Harold Joseph Highlands", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "228--228", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900168", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LEb, author = "Anonymous", title = "Letters to the editor", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "229--231", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890017X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:OSH, author = "Dr. Harold Joseph Highland", title = "{Open Sesame} --- Hackers welcome", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "232--233", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900181", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SDD, author = "Dr. Harold Joseph Highland", title = "Security director's dilemma", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "233--235", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900193", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HTV, author = "Dr. Harold Joseph Highland", title = "How to test a virus filter without a virus", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "235--237", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890020X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VDR, author = "Dr. Harold Joseph Highland", title = "Virus disaster red book", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "237--237", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900211", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:BCV, author = "Dr. Harold Joseph Highland", title = "Blitzed by a computer virus", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "237--239", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900223", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SVP, author = "Dr. Harold Joseph Highland", title = "Special virus protection measures", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "239--242", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900235", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:UCN, author = "Dr. Harold Joseph Highland", title = "Upcoming conferences of note", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "242--243", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900247", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SWS, author = "Dr. Harold Joseph Highland", title = "Star wars security or where did those micros go?", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "243--244", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900259", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1988:MIS, author = "Jack Bologna", title = "Managing an information system crisis", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "245--247", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900260", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1988:DDP, author = "Bernard P. Zajac", title = "Distributed data processing: New problems", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "249--250", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900272", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Milor:1988:CSA, author = "G. Will Milor", title = "The computer security act of 1987", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "251--253", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900284", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{David:1988:TVF, author = "Jon David", title = "Treating viral fever", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "255--258", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900296", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:RLV, author = "Anonymous", title = "Revised list of virus filters", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "259--260", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900302", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1988:B, author = "Belden Menkus", title = "Breakpoints", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "261--268", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900314", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRc, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "269--270", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900326", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanBiene-Hershey:1988:TEA, author = "Margaret E. van Biene-Hershey", title = "The technical {EDP}-audit function", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "271--277", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900338", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1988:DPC, author = "Fred Cohen", title = "Designing provably correct information networks with digital diodes", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "279--286", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890034X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pluimakers:1988:SNA, author = "G. M. J. Pluimakers", title = "Some notes on authorization and transaction management in distributed database systems", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "287--298", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900351", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{VanderBank:1988:CFM, author = "Dirk {Van der Bank} and Edwin Anderssen", title = "Cryptographic figures of merit", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "299--303", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900363", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCc, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "305--306", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900375", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HIT, author = "Anonymous", title = "Highlights of {IFIP TC 11} meeting", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "307--308", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900387", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RFN, author = "Dr. Harold Joseph Highland", title = "Report on the fourth national computer security conference: {COMPSEC IV}", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "309--311", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900399", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Paans:1988:SEC, author = "Dr. Ronald Paans", title = "The second {European} conference on computer audit, control and security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "312--315", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900405", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WSb, author = "Anonymous", title = "What others are saying", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "316--319", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900417", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HWN, author = "Esther H. Highland", title = "{HR} 145: {What}'s next", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "320--320", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900442", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RRM, author = "Esther H. Highland", title = "Recent rulings may give states copyright immunity", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "320--320", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900429", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SAS, author = "Esther H. Highland", title = "Security act is signed: Copyright Bill backed", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "320--320", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900430", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CSF, author = "Esther H. Highland", title = "Computer security: the federal approach", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "320--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900454", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:BCL, author = "Esther H. Highland", title = "{Brazil} copyright law could thwart pirates", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900478", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CCS, author = "Esther H. Highland", title = "Computer cross sections unite at law conference", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900491", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HLR, author = "Esther H. Highland", title = "Hashing out legal rights", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890051X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:LAL, author = "Esther H. Highland", title = "Long arm of the law", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890048X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NSL, author = "Esther H. Highland", title = "New security law compels federal agencies to act", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900466", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PCN, author = "Esther H. Highland", title = "Personal but not confidential: a new debate over privacy", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--321", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900508", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ASM, author = "Esther H. Highland", title = "{Apple} slaps {Microsoft}, {HP} with copyright suit", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "321--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900521", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ALU, author = "Esther H. Highland", title = "Are {Apple} and {Lotus} unfair?", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900557", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ELS, author = "Esther H. Highland", title = "Exec liable in software copy case, court rules", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900569", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HBW, author = "Esther H. Highland", title = "{House Bill} would increase 1989 funding for {NBS}", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900570", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HPMb, author = "Esther H. Highland", title = "{H-P}, {Microsoft} respond to {Apple} copyright suit", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900545", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:IPS, author = "Esther H. Highland", title = "Information property: Some intellectual property aspects of the global information economy", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900582", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:LFD, author = "Esther H. Highland", title = "The {``look} and {feel''} debate", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--322", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900533", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CIG, author = "Esther H. Highland", title = "Computer insurance: the gaps", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "322--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900594", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CW, author = "Esther H. Highland", title = "Computer weekly", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900661", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DRP, author = "Esther H. Highland", title = "Disaster recovery planning", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900624", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:LPS, author = "Esther H. Highland", title = "Legal protection of software in the {United Kingdom}", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900636", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PAV, author = "Esther H. Highland", title = "{Pentagon} attacks viruses", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900648", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SAC, author = "Esther H. Highland", title = "Secure access control and {MAC}-based signatures", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900600", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TSA, author = "Esther H. Highland", title = "Typical system access control problems and solutions", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900612", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VCK, author = "Esther H. Highland", title = "Virus that could kill", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--323", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890065X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NSG, author = "Esther H. Highland", title = "{NSA} suppresses {GAO} report", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "323--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900673", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CBP, author = "Esther H. Highland", title = "Computer backup pools, disaster recovery, and default risk", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900727", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:LS, author = "Esther H. Highland", title = "{LAN} security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900697", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TL, author = "Esther H. Highland", title = "Tangible losses", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900715", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TM, author = "Esther H. Highland", title = "{Tempest} micros", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900685", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:UST, author = "Esther H. Highland", title = "Unprotected symphony tunes up", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--324", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900703", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RBI, author = "Esther H. Highland", title = "Red book includes a metaphysical look at security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "324--325", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900739", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CSU, author = "Esther H. Highland", title = "Computer systems under siege", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "325--325", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900752", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CVS, author = "Esther H. Highland", title = "Computer viruses spread", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "325--325", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900764", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SHV, author = "Esther H. Highland", title = "Software, hardware ``vaccines'' stem threat of deadly computer viruses", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "325--325", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900776", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SSY, author = "Esther H. Highland", title = "Security and software: Are you fully insured?", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "325--325", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900740", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DFC, author = "Esther H. Highland", title = "{DOD} fights off computer virus", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "325--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900788", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MSC, author = "Esther H. Highland", title = "Microcomputer security and control", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900806", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NEG, author = "Esther H. Highland", title = "New emphasis given to {UNIX} security problems", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900818", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SCD, author = "Esther H. Highland", title = "Satellite communications for disaster recovery", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900843", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SCC, author = "Esther H. Highland", title = "{``Safe computing''} catching", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900831", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:UNR, author = "Esther H. Highland", title = "Under new rule, auditors must search out fraud", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890082X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VGB, author = "Esther H. Highland", title = "A virus gives business a chill", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--326", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890079X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CSG, author = "Esther H. Highland", title = "Calamities spark growing field", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "326--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900855", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CCM, author = "Esther H. Highland", title = "Computer crime: {MIS} confronts a cancer", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900909", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:FTI, author = "Esther H. Highland", title = "Fault tolerance increasingly important for {LANS}", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900879", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PCB, author = "Esther H. Highland", title = "Planning, consulting boost biometric bill", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900892", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SDS, author = "Esther H. Highland", title = "Structing the data security program", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900910", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SSR, author = "Esther H. Highland", title = "Security systems rescue data from snoopers, user blunders", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900867", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VFR, author = "Esther H. Highland", title = "Voice, finger and retina scans: Can biometrics secure your shop?", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--327", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900880", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VEV, author = "Esther H. Highland", title = "{VMSecure}: Enhancing {VM} security and control", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "327--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900922", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DCS, author = "Esther H. Highland", title = "{DEC} computer security tactics come into focus", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890096X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DDS, author = "Esther H. Highland", title = "Decentralized {DP} sites seen lacking in recovery planning", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900971", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DSF, author = "Esther H. Highland", title = "Disturbance in several forms", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900958", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PQI, author = "Esther H. Highland", title = "Power quality issues smack micro market", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900946", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SAP, author = "Esther H. Highland", title = "A sensible approach to protecting your data", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900983", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:WAU, author = "Esther H. Highland", title = "What about users should know about {PC} security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--328", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900934", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PME, author = "Esther H. Highland", title = "Preventive measures to ensure {PC} data security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "328--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900995", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:IDS, author = "Esther H. Highland", title = "An introduction to database security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901046", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MPP, author = "Esther H. Highland", title = "Make a plan for {PC} disaster recovery", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901009", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PWS, author = "Esther H. Highland", title = "Programmer workstation security", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901058", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RPB, author = "Esther H. Highland", title = "Reliable power: Beyond the big box", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901022", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TSC, author = "Esther H. Highland", title = "Top secret --- Concepts and implementation", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901034", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:WTS, author = "Esther H. Highland", title = "When trouble strikes, a {UPS} can save the data", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--329", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901010", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CMP, author = "Esther H. Highland", title = "{It}'s critical to make {PC} security as flexible as {PCs} themselves", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "329--330", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890106X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MRO, author = "Esther H. Highland", title = "{MCSC} regs outline basic security level for {PCs}", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "330--330", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901071", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SBC, author = "Anonymous", title = "Security basics for cable\slash video display radiation", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "330--331", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901083", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "332--332", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901095", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PJ, author = "Anonymous", title = "Pages 228--332 ({June 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "3", pages = "??--??", month = jun, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:35 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:Eb, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "334--334", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905615", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1988:EIC, author = "Frederick Cohen", title = "Ethical issues in computer virus distribution", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "335--336", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905627", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HOC, author = "Harold Joseph Highland", title = "How to obtain a computer virus", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "337--337", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905639", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VAS, author = "Harold Joseph Highland", title = "Are virus attack statistics reliable?", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "338--338", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905640", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HR, author = "Harold Joseph Highland", title = "Hackers revisited", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "339--339", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905652", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NVT, author = "Harold Joseph Highland", title = "New video terminal law", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "340--340", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905664", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:EEM, author = "Harold Joseph Highland", title = "Electromagnetic eavesdropping machines for {Christmas}?", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "341--341", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905676", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TT, author = "Harold Joseph Highland", title = "Tips on terrorism", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "344--344", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905688", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:IRV, author = "Harold Joseph Highland", title = "Investigating a reported virus attack", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "344--345", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890569X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VFUa, author = "Harold Joseph Highland", title = "Virus filter update", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "345--345", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905706", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:F, author = "Anonymous", title = "Footnote", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "346--346", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905718", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Madsen:1988:WMT, author = "C. Wayne Madsen", title = "The world meganetwork and terrorism", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "347--352", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890572X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1988:SRH, author = "Jack Bologna", title = "Selection risks in hiring information systems personnel", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "353--355", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905731", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AD, author = "Harold Joseph Highland", title = "The anatomy of a {DOS} Disk", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "357--360", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905743", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1988:UGA, author = "Belden Menkus", title = "{U.S. Government} agencies belatedly address information system security issues", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "361--366", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905755", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:BVF, author = "Harold Joseph Highland", title = "The brain virus: Fact and fantasy", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "367--370", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905767", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRd, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "371--372", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905779", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Summers:1988:PAK, author = "Rita C. Summers and Stanley A. Kurzban", title = "Potential applications of knowledge-based methods to computer security", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "373--385", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905780", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{McHugh:1988:MSI, author = "John McHugh and Bhavani M. Thuraisingham", title = "Multilevel security issues in distributed database management systems", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "387--396", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905792", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Witten:1988:PAA, author = "Ian H. Witten and John G. Cleary", title = "On the privacy afforded by adaptive text compression", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "397--408", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/datacompression.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905809", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1988:TSF, author = "Fred Cohen and Stephen Bruhns", title = "Two secure file servers", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "409--414", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905810", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCd, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "415--416", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905822", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:WWRc, author = "Anonymous", title = "World-wide reports on developments in computer security", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "417--422", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905834", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AFR, author = "Esther H. Highland", title = "{Apple} files response to {Microsoft}'s countersuit: Laurie Flynn {InfoWorld}, {May} 2, 1988, p. 5", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890586X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AMSa, author = "Esther H. Highland", title = "{Apple\slash Microsoft} suit split in two: {Rachel Parker, InfoWorld, May 23, 1988, p. 1}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905883", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AMSb, author = "Esther H. Highland", title = "{Apple--Microsoft} suit raises issue of vague copyright laws: {Robert Francis, Datamation, May 15, 1988, pp. 22, 26}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905895", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RDM, author = "Esther H. Highland", title = "Review: {{\booktitle{Dispute over Mac user interface longstanding}}: Stuart J. Johnston, InfoWorld, April 25, 1988, p. 33}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905858", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RMC, author = "Esther H. Highland", title = "Review: {{\booktitle{Microsoft charges Apple with breach of contract}}: Stuart J. Johnston and Rachel Parker InfoWorld, April 11, 1988, pp. 1, 81}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905846", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MSSa, author = "Esther H. Highland", title = "{Microsoft} seeks to split {Apple} suit into two phases: {Rachel Parker, InfoWorld, May 23, 1988, p. 5}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--423", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905871", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MOO, author = "Esther H. Highland", title = "{MBS}, {OPM} officials plan broad security guidelines: {Kevin Power, Government Computer News, May 13, 1988, pp. 1, 92}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "423--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905901", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ARF, author = "Esther H. Highland", title = "Agencies ready forces for data security campaign: {Robert V. Head, Government Computer News, May 27, 1988, pp. 27, 31}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905913", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CIK, author = "Esther H. Highland", title = "Computer insecurity: {Ken McLeod, Information Age, April 1988, pp. 89--93}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905962", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RRO, author = "Esther H. Highland", title = "Review: {{\booktitle{Reliance on optical fibres to increase telecommunication security}}: Alan H. Friedberg, Robert M. Harper and Michael J. Cerullo, Information Age, April 1988, pp. 73--78}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905937", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SCN, author = "Esther H. Highland", title = "Smart cards: a new tool for identification and access protection: {Rola Krayem, Information Age, April 1988, pp. 85--88}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905950", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SOD, author = "Esther H. Highland", title = "Security, {OSI} and distributed systems: {T. Knowles Information Age, April 1988, pp. 79--84}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905949", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RUS, author = "Esther H. Highland", title = "Review: {{\booktitle{Unix system security issues}}: Michael J. Knox and Edward D. Bowden, Information Age, April, 1988, pp. 67--72}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905925", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RUU, author = "Esther H. Highland", title = "Review: {{\booktitle{UFS: User-friendly security}}: Alan R. Krull Computer Control Quarterly, Spring 1988, pp. 1--9}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--424", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905974", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:REG, author = "Esther H. Highland", title = "Review: {{\booktitle{The executives guide to workstation management and data security}}: Mark Goode Computer Control Quarterly, Spring 1988, pp. 10--17}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "424--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905986", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CWT, author = "Esther H. Highland", title = "Can we trust computers?: {Andrew M. Lister, Computer Control Quarterly, Spring 1988, pp. 31--35}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906001", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:IHD, author = "Esther H. Highland", title = "Insurance and the hacker: {David Davies, Computer Control Quarterly, Spring 1988, pp. 28--30}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888905998", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MSR, author = "Esther H. Highland", title = "Media security: {Ralph M. Smole, Computer Control Quarterly, Spring 1988, pp. 36--37}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906013", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MVSa, author = "Esther H. Highland", title = "{Mac} virus surfaces in {Washington}: {Nick Arnett InfoWorld, April 11, 1988, pp. 1, 3}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906025", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NBE, author = "Esther H. Highland", title = "A nasty bug: Editorial {Computerworld, April 4, 1988, p. 18}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906049", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RNV, author = "Esther H. Highland", title = "Review: {{\booktitle{New virus damaging Mac data, group says}}: Scott Mace InfoWorld, April 11, 1988, p. 29}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--425", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906037", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SEG, author = "Esther H. Highland", title = "Security expert gives advice on computer viruses: {Tim McGraw, Government Computer News, April 15, 1988, p. 17}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "425--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906050", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ARAa, author = "Esther H. Highland", title = "{Apple} releases ``anti-viral'' program: {Nick Arnett InfoWorld, May 2, 1988, p. 8}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906086", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CVC, author = "Esther H. Highland", title = "Computer viruses can infect entire organizations: {Angel L. Rivera, Government Computer News, April 29, 1988, pp. 37, 43}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906098", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:FOP, author = "Esther H. Highland", title = "{Federal} officials puzzled by computer virus attacks: {Neil Munro and Richard A. Dance, Government Computer News, April 29, 1988, p. 89}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906074", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MVD, author = "Esther H. Highland", title = "{Mac} virus discovered at {EPA}, vaccination called successful: {Richard A. Danca, Government Computer News, May 13, 1988, p. 4}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906104", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MVSb, author = "Esther H. Highland", title = "{Macintosh} virus seeks {EDS} signatures: {Nick Arnett InfoWorld, April 25, 1988, p. 8}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--426", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906062", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SHB, author = "Esther H. Highland", title = "Security habits build healthy software: {David J. Stang, Government Computer News, May 27, 1988, p. 53}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "426--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906116", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:RSCb, author = "Anonymous", title = "Review: {{\booktitle{Spread of computer viruses worries users}}: John Voelcher The Institute, IEEE Spectrum, June 1988, p. 1 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906177", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RCG, author = "Esther H. Highland", title = "Review: {{\booktitle{Confronting the growing threat of harmful computer software viruses}}: Jim Seymour and Jonathan Matzkin PC Magazine, June 28, 1988, pp. 33--35}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906153", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HBC, author = "Esther H. Highland", title = "The hype behind computer viruses: Their bark may be worse than their ``byte'': {Paul Karon PC Week, May 31, 1988, pp. 49, 53}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890613X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HVP, author = "Esther H. Highland", title = "How vaccine programs work: {Neil J. Rothenberg, PC Magazine, June 28, 1988, p. 35}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906165", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VIC, author = "Esther H. Highland", title = "Viruses infect corporate {MIS}: {Alan J. Ryan, Computerworld, May 30, 1988, pp. 29, 31}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906128", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VPU, author = "Esther H. Highland", title = "Virus-plagued user warned of snake-oil pitch: {Robert L. Scheirer, PC Week, May 10, 1988, p. 170}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--427", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906141", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:OAC, author = "Esther H. Highland", title = "{OMB} advocates control model for systems security: {Kevin Power, Government Computer News, March 18, 1988, p. 21}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "427--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906189", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HME, author = "Esther H. Highland", title = "How much is enough? {Expert} says security efforts should pay, not cost: {William Murray, Computerworld Focus, April 6, 1988, p. 30 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906232", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:HSY, author = "Esther H. Highland", title = "How safe is your data: {Joseph} M. Pujals Information Center, {April} 1988, p. 46", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906219", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ICH, author = "Esther H. Highland", title = "It can't happen here: {Patricia Keefe, Computerworld Focus, April 6, 1988, pp. 13--16}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906244", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RPAa, author = "Esther H. Highland", title = "Review: {{\booktitle{Problems in auditing expert system development}}: Wayne J. Socha, Edpacs, March 1988, pp. 1--6}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906190", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RSC, author = "Esther H. Highland", title = "Review: {{\booktitle{Security concerns in a local area network environment}}: Michael I. Sobol, Telecommunications, March 1988, p. 96 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906207", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SCP, author = "Esther H. Highland", title = "{SPA} cracks down on piracy, raids computer retailer: {Nick Arnett InfoWorld, April 4, 1988, p. 6}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--428", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906220", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RBR, author = "Esther H. Highland", title = "Review: {{\booktitle{Breach reported in U.S. computers}}: John Markoff, The New York Times, April 18, 1988, pp. A1, A19}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "428--429", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906256", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MPW, author = "Esther H. Highland", title = "Monitoring points out weak spots: {Gardner Terrell, Government Computer News, April 29, 1988, pp. 1, 88}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "429--429", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906268", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RTF, author = "Esther H. Highland", title = "Risk! {The} third factor: {Paul Tate, Datamation, April 15, 1988, p. 58 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "429--429", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906293", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SPG, author = "Esther H. Highland", title = "Security problems greater than ever: {Barbara Bates, Information WEEK, April 18, 1988, p. 48}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "429--429", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906281", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SWH, author = "Esther H. Highland", title = "Stalking the Wily Hacker: {Clifford Stoll, Communications of the ACM, May 1988, pp. 484--497}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "429--429", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890627X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TCT, author = "Esther H. Highland", title = "Tough countermeasures thwart hackers who attack vital data: {Ram Pemmaraju, Computer Technology Review, April 1988, p. 8 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "429--430", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890630X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:AFA, author = "Esther H. Highland", title = "Agencies fail to appreciate threat to data security: {Belden Menkus, Government Computer New, April 29, 1988, p. 36}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "430--430", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906347", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RLM, author = "Esther H. Highland", title = "Review: {{\booktitle{Loose MIPS sink ships}}: W. Mark Goode, Government Data Systems, April 1988, pp. 12--13}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "430--430", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906335", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:LSP, author = "Esther H. Highland", title = "{LAN} security problem detected on {Navy} ships: {Brad Bass, Government Computer News, April 1, 1988, pp. 1, 84}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "430--430", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906323", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TSV, author = "Esther H. Highland", title = "Top secret, and vulnerable: {John Markoff, The New York Times, April 25, 1988, pp. D1, D4}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "430--430", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906311", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:OSW, author = "Esther H. Highland", title = "Operating system is weak link in {MVS} security: {Brian Currah, Government Computer News, April 29, 1988, p. 44}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "430--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906359", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:DRM, author = "Esther H. Highland", title = "Despite regs, most agencies lack disaster plan: {Tari Schreider, Government Computer News, April 29, 1988, p. 54}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906402", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:MSSb, author = "Esther H. Highland", title = "Micro security system effective even on laptops: {Peter Stevenson, Government Computer News, April 29, 1988, p. 48}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906384", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:NRH, author = "Esther H. Highland", title = "{NSA} regs hinder inexpensive network security: {Barbara Bates, Government Computer News, April 29, 1988, pp. 50, 54}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906396", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:PEM, author = "Esther H. Highland", title = "Picking encryption method is no time for secrets: {Harold Joseph Highland, Government Computer News, April 29, 1988, p. 39}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906360", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RPP, author = "Esther H. Highland", title = "Review: {{\booktitle{Proper procedures are final security safeguard}}: Christine E. Howkins, Government Computer News, April 29, 1988, p. 40}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--431", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906372", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RRC, author = "Esther H. Highland", title = "A redundancy reducing cipher: {Peter Wayner, Cryptologia, April 1988, pp. 107--112}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "431--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906414", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:FKC, author = "Esther H. Highland", title = "Fire {KOs} {Chicago} networks: {Jean S. Bozman, Computerworld, May 16, 1988, pp. 1, 121}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906451", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RLR, author = "Esther H. Highland", title = "Review: {{\booktitle{Lotus removes 1--2--3 protection}}: Douglas Barney, Computerworld, May 16, 1988, p. 5}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890644X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RPAb, author = "Esther H. Highland", title = "Review: {{\booktitle{Planning averts disaster at L.A. Bond trading firm}}: James A. Martin, Computerworld, May 9, 1988, p. 4}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906463", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:SSE, author = "Esther H. Highland", title = "Speakers say employee attitude is key to security: {Kevin Power, Computerworld, May 13, 1988, p. 14}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906426", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TIE, author = "Esther H. Highland", title = "Taming the indoor elements: {Nina Frank, Digital Review, May 16, 1988, pp. 91--93}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906475", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:TMS, author = "Esther H. Highland", title = "Technology makes security of voice and data against sabotage both effective and affordable: {Paul Kirvan, Communications News, May 1988, pp. 82--83}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--432", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906438", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CSN, author = "Esther H. Highland", title = "Computer systems need isolated ground that is safe and noise free: {Thomas M. Gruzs, Computer Technology Review, Spring 1988, p. 103 ff}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "432--433", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906487", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:APb, author = "Anonymous", title = "Addresses of publications", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "433--433", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906505", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ITD, author = "Esther H. Highland", title = "Information technology and dataveillance: {Roger A. Clarke, Communications of the ACM, May 1988, pp. 498--512}", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "433--433", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906499", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:Cd, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "435--435", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888906517", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PAb, author = "Anonymous", title = "Pages 334--435 ({August 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "4", pages = "??--??", month = aug, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:37 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:Ec, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "438--438", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901897", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:UCC, author = "Harold Joseph Highland", title = "{U.S. Congress} computer virus report", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "439--439", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901903", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:WPT, author = "Harold Joseph Highland", title = "Write-protect tab warning", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "439--439", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901915", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VFE, author = "Harold Joseph Highland", title = "Virus filter evaluation", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "440--440", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901927", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:VFUb, author = "Harold Joseph Highland", title = "Virus filter update", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "441--442", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901939", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:CVM, author = "Harold Joseph Highland", title = "Computer viruses: Media hyperbole, errors and ignorance", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "442--450", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901940", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Glath:1988:CGV, author = "Raymond M. Glath", title = "The case of the {``Gerbil virus''} that wasn't", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "451--453", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901952", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1988:CIS, author = "Charles Cresson Wood", title = "A context for information systems security planning", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "455--465", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901964", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Schweitzer:1988:SNB, author = "Jim Schweitzer", title = "Security news briefs", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "467--469", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901976", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1988:VSW, author = "Bernard P. Zajac", title = "Viruses: Should we quit talking about them?", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "471--472", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888901988", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRe, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "473--474", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890199X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1988:PPT, author = "John M. Carroll and Robert B. Mowat and Lynda E. Robbins and David Wiseman", title = "The password predictor --- a training aid for raising security awareness", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "475--481", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902003", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mitchell:1988:SMS, author = "Chris Mitchell and Michael Walker", title = "Solutions to the multidestination secure electronic mail problem", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "483--488", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902015", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1988:MPP, author = "Fred Cohen", title = "Maintaining a poor person's information integrity", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "489--494", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902027", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pfleeger:1988:TFA, author = "Charles P. Pfleeger and Shari Lawrence Pfleeger", title = "A transaction flow approach to software security certification for document handling systems", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "495--502", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902039", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Huang:1988:SWP, author = "Yue Jiang Huang and Fred Cohen", title = "Some weak points of one fast cryptographic checksum algorithm and its improvement", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "503--505", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902040", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCe, author = "Anonymous", title = "{IFIP} Technical Committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "507--508", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902052", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CISa, author = "Anonymous", title = "Computer information security and protection. {June 1985--April 1987} (Citations from the {NTIS} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "509--509", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902064", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zaritsky:1988:MSI, author = "I. S. Zaritsky", title = "Microcomputer security issues in an office environment", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "509--509", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902076", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tonn:1988:AIR, author = "B. E. Tonn and C. B. Travis and L. Arrowood and R. Goeltz and C. A. Mann", title = "Analysis of individual risk belief structures", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "509--510", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902088", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CDP, author = "Anonymous", title = "Computer disasters: Prevention and recovery. {1975--September 1986} (Citations from the {INSPEC: Information Services for the Physics and Engineering Communities} Database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "510--510", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890209X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Burnham:1988:DES, author = "B. Burnham", title = "{DES} (Data Encryption Standard) cryptographic services designed for the {DOE} wide band communications network", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "510--510", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890212X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Peercy:1988:RAM, author = "D. E. Peercy and M. D. Estill and K. L. Shaw", title = "Risk Assessment Methodology for Software Supportability {(RAMSS)}: {User}'s handbook", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "510--510", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902118", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Peercy:1988:SSR, author = "D. E. Peercy and W. Huebner and M. D. Estill and J. C. Wu", title = "Software supportability risk assessment in {OT\&E} (Operational Test and Evaluation): Historical baselines for risk profiles. Volumes 1 and 2", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "510--510", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902106", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jung:1988:IRC, author = "A. Jung", title = "Implementing the {RSA} cryptosystem", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "510--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902131", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CISb, author = "Anonymous", title = "Computer information security and protection. {November 1986--October 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902179", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CPE, author = "Anonymous", title = "Computer performance evaluation. {July 1983--April 1988} (citations from the {NTIS} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902180", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DESa, author = "Anonymous", title = "{Data Encryption Standard. January 1975--January 1988 (citations from the INSPEC: Information Services for the Physics and Engineering Communications Database)}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902143", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DESb, author = "Anonymous", title = "Data encryption standard. {1975--January 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} Database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902155", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SSV, author = "Anonymous", title = "Secure software verification tools", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902192", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gaglione:1988:ITP, author = "A. M. Gaglione", title = "Information theory and public key cryptosystems", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "511--511", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902167", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IPRa, author = "Anonymous", title = "Intellectual property rights in an age of electronics and information. {Contractor} documents. {Volume} 1", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890226X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MDS, author = "Anonymous", title = "Microcomputers: Data and software security. {1974--February 1987} (citations from the {INSPEC}: {Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902246", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MML, author = "Anonymous", title = "Microcomputer to mainframe links. {January 1975--February 1988} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902210", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Baum:1988:ESS, author = "William E. Baum and Judith H. Podell and G. N. Romstedt", title = "Expert system for software quality assurance", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902258", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{David:1988:UCE, author = "H. David and J. Roelofsen", title = "Use of colour on electronic data displays (second study)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902222", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sherman:1988:CVV, author = "A. T. Sherman", title = "Cryptology and {VLSI (Very Large Scale Integration)}. {I}. {Detecting} and exploiting algebraic weaknesses in cryptosystems. {II}. {Algorithms} for placing modules on a custom {VLSI} chip", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902234", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Villarreal:1988:IW, author = "J. Villarreal", title = "Innovative workstation", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "512--512", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902209", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Allen:1988:DAR, author = "Bruce M. Allen", title = "Data acquisition, reduction, and analysis using a microcomputer", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902301", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCJa, author = "Anonymous", title = "Computer crime. {January 1975--October 1986} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902283", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCN, author = "Anonymous", title = "Computer crime. {November 1986--October 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902295", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IPRb, author = "Anonymous", title = "Intellectual property rights in an age of electronics and information. {Contractor} documents. {Volume} 2", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902313", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SSP, author = "Anonymous", title = "Software security and piracy. {February 1984--March 1986} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902325", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Braum:1988:SCD, author = "H. Braum", title = "Security considerations --- defence-related and commercial", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--513", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902271", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Malkoff:1988:RTF, author = "D. B. Malkoff", title = "Real-time fault detection and diagnosis: the use of learning expert systems to handle the timing of events", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "513--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902337", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:MMF, author = "Anonymous", title = "Microcomputer modems. {1975--February 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902386", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Linn:1988:TOO, author = "R. J. Linn and J. S. Nightingale", title = "Testing {OSI (Open Systems Interconnection)} protocols at the {National Bureau of Standards}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902349", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lundberg:1988:CCA, author = "B. G. Lundberg", title = "{CONST} --- a constructive approach to information modelling", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902362", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Snyder:1988:DQS, author = "C. E. Snyder", title = "Data quality: a strategic perspective", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902350", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Tanca:1988:EES, author = "L. Tanca and S. Ceri", title = "{ELAND}: an expert system for the configuration of local area networks applications", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--514", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902374", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CNS, author = "Anonymous", title = "Computer network standards. {1975--February 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "514--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902398", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ECN, author = "Anonymous", title = "{Ethernet} communication networks. 1978-1986 (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902428", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:LAN, author = "Anonymous", title = "Local area networks. {January 1986--December 1986} (citations from the engineering index database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890243X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Chien:1988:CCR, author = "A. A. Chien", title = "Congestion control in routing networks", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902416", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Frankel:1988:GSP, author = "S. Frankel", title = "Guidance on software package selection", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902404", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Greene:1988:STAa, author = "Joseph S. Greene and T. Probert and W. Riddle and C. Giese and T. L. Quindry", title = "Software Technology for Adaptable, Reliable Systems {(STARS)} program management plan", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902453", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kimball:1988:CCF, author = "Mary C. Kimball", title = "Central computer facility software directory", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--515", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902441", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Greene:1988:STAb, author = "Joseph S. Greene and T. Probert and W. Riddle and C. Giese and T. L. Quindry", title = "Software Technology for Adaptable, Reliable Systems {(STARS)} technical program plan", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "515--516", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902465", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mueller-Boeling:1988:ISB, author = "D. Mueller-Boeling", title = "{Informationstechnik aus der Sicht der Benutzer im Wandel des letzten Jahrezehnts} ({Information} technology from the point of the user during the last decade)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "516--516", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902507", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Nicholson:1988:MDA, author = "W. L. Nicholson and P. J. Cowley and D. B. Carr and M. A. Whiting", title = "Managing the data analysis process", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "516--516", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902477", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Osborne:1988:ABS, author = "W. M. Osborne and R. Raigrodski", title = "Annotated bibliography on software maintenance", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "516--516", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902489", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wong:1988:MOS, author = "W. Wong", title = "Management overview of software reuse", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "516--516", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902490", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hurford:1988:UUA, author = "J. M. Hurford and C. A. Ramsey", title = "Understanding user attitudes: the cornerstone of computer documentation", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "516--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902519", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SQMa, author = "Anonymous", title = "Software quality and metrics. {January 1975--December 1986} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890257X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Holt:1988:SEE, author = "H. M. Holt", title = "Software error experiment", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902520", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kiefhaber:1988:NSW, author = "A. Kiefhaber", title = "National survey of worksite health promotion programs, 1985", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902532", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kolodner:1988:RUV, author = "E. K. Kolodner", title = "Recovery using virtual memory", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902544", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Miller:1988:GPS, author = "D. F. Miller", title = "Guidelines for preparing software user documentation", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902568", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Requa:1988:WMC, author = "J. Requa", title = "Workstation\slash mainframe connection", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--517", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902556", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SQMb, author = "Anonymous", title = "Software quality and metrics. {January 1987--December 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "517--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902581", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCJb, author = "Anonymous", title = "Cryptography and cryptosystems. {January 1987--December 1987} (citations from the {INSPEC: Information Services for the Physics and Engineering Communities} database)", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902593", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CSM, author = "Anonymous", title = "Computer software maintenance. {January 1970--August 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902635", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CST, author = "Anonymous", title = "Computer software transferability and portability. {January 1970--August 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902647", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CVR, author = "Anonymous", title = "Computer voice recognition: Market aspects. {January 1983--July 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902623", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCTb, author = "Anonymous", title = "Data compression: Techniques and applications. {October 1983--September 1986}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/datacompression.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902611", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:HRC, author = "Anonymous", title = "Handwriting recognition by computer. {January 1970--August 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902659", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Voigt:1988:DRT, author = "R. J. Voigt", title = "Design of a real time operating system for a fault tolerant microcomputer", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--518", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890260X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SCJ, author = "Anonymous", title = "Smart cards. {January 1983--August 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "518--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902660", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCJc, author = "Anonymous", title = "Cryptography and cryptosystems. {January 1970--October 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902738", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCD, author = "Anonymous", title = "Directory of computerized data files, 1987", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902672", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCTc, author = "Anonymous", title = "Data compression: Techniques and applications. {October 1983--September 1986}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/datacompression.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902684", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:DCTd, author = "Anonymous", title = "Data compression: Techniques and applications. {October 1986--September 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/datacompression.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902696", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ESNb, author = "Anonymous", title = "Expert systems: Non-industrial applications. {January 1984--March 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902702", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ICM, author = "Anonymous", title = "{IC} card with a microprocessor", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902726", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gaglione:1988:SCT, author = "A. M. Gaglione", title = "Some complexity theory for cryptography", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--519", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; http://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902714", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCSb, author = "Anonymous", title = "Computer communications software. {January 1975--October 1986}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "519--520", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890274X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:CCSc, author = "Anonymous", title = "Computer communications software. {November 1986-September 1987}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "520--520", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902751", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:NCA, author = "Anonymous", title = "Neutral computers, auditing and security", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "520--520", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902763", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Byles:1988:LFD, author = "Torrey Byles", title = "``Look-and-feel'' decision looms", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--521", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902775", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Goff:1988:HPC, author = "Leslie Goff", title = "{H-P} countersues {Apple}", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--521", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902817", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Grimm:1988:BRD, author = "Vanessa Jo Grimm", title = "Bill to regulate data matching moves to floor", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--521", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902799", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jones:1988:MHP, author = "Stephen Jones", title = "{Microsoft}, {H-P} shrug off {Apple} suit", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--521", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902805", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Parker:1988:IPC, author = "Rachel Parker", title = "Industry praises copyright decision", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--521", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902787", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Richman:1988:APR, author = "Sheldon L. Richman", title = "{Apple} property rights suit can backfire", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "521--522", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902829", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Barker:1988:UCS, author = "Paul Barker", title = "{Unisys Canada} slaps \$500 K lawsuit on firm", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "522--522", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902830", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bridges:1988:CVS, author = "Linda Bridges", title = "Computer viruses strike colleges and companies, leaving them defensive", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "522--522", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902866", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lewis:1988:CIB, author = "Brenda D. Lewis", title = "Copyright issue blurs", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "522--522", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902854", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Raab:1988:PCM, author = "Selwyn Raab", title = "Police chief of Metro-{North} indicted in computer misuse", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "522--522", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902842", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SAC, author = "Anonymous", title = "Sabotage aimed at computer company destroys government data", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "522--523", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888902878", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Parker:1988:SML, author = "Rachel Parker", title = "Scent of money lures firms to jump on antiviral bandwagon", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "523--523", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890288X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PO, author = "Anonymous", title = "Pages 438--530 ({October 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "5", pages = "??--??", month = oct, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:39 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:Ed, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "532--532", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900016", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:RBB, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "533--541", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900028", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Stoll:1988:HSC, author = "Cliff Stoll", title = "How secure are computers in the {U.S.A.}?: an analysis of a series of attacks on {Milnet} computers", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "543--547", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488890003X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1988:UPC, author = "Belden Menkus", title = "Understanding password compromise", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "549--552", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900041", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1988:SWC, author = "Jack Bologna", title = "{Soviet} white-collar crime and criminal justice", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "553--556", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900053", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:IBRf, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "557--558", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900065", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Eloff:1988:CSP, author = "Jan H. P. Eloff", title = "Computer security policy: Important issues", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "559--562", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900077", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Carroll:1988:IMS, author = "John M. Carroll", title = "Implementing multilevel security by violation privilege", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "563--573", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900089", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Biskup:1988:PMD, author = "Joachim Biskup and Hans Hermann Br{\"u}ggeman", title = "The personal model of data:: Towards a privacy-oriented information system", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "575--597", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900090", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sandhu:1988:NCA, author = "Ravinderpal Singh Sandhu", title = "Nested categories for access control", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "599--605", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900107", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:ITCf, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "607--608", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900119", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1988:ARAb, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "609--615", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900120", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:Ce, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "616--616", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900132", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:AIV, author = "Anonymous", title = "Author index to volume 7", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "617--618", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900144", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:SIV, author = "Anonymous", title = "Subject index to volume 7", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "619--619", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404888900156", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1988:PD, author = "Anonymous", title = "Pages 532--619 ({December 1988})", journal = j-COMPUT-SECUR, volume = "7", number = "6", pages = "??--??", month = dec, year = "1988", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "2--2", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900291", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Ea, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "2--2", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900308", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBa, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "3--13", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990031X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Moulton:1989:POP, author = "Rolf Moulton and Robert P. Bigelow", title = "Protecting ownership of proprietary information", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "15--21", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900321", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoffman:1989:RAC, author = "Lance J. Hoffman", title = "Risk analysis and computer security: Towards a theory at last", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "23--24", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900333", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1989:LOC, author = "Bernard P. Zajac", title = "Legal options to computer viruses", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "25--27", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900345", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1989:OMF, author = "Jack Bologna", title = "The one minute fraud auditor", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "29--31", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900357", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRa, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "33--34", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900369", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gleissner:1989:MTS, author = "Winfried Gleissner", title = "A mathematical theory for the spread of computer viruses", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "35--41", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900370", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Lunt:1989:ACP, author = "Teresa F. Lunt", title = "Access control policies: Some unanswered questions", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "43--54", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900382", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mitchell:1989:RHF, author = "Chris Mitchell and Dave Rush and Michael Walker", title = "A remark on hash functions for message authentication", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "55--58", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900394", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Feuerlicht:1989:RCI, author = "J. Feuerlicht and P. Grattan", title = "The role of classification of information in controlling data proliferation in end-user personal computer environment", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "59--66", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900400", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCa, author = "Anonymous", title = "{IFIP} Technical Committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "67--68", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900412", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:SAS, author = "Anonymous", title = "Special abstract: Study of computer ``viruses'' and their potential for infecting {Commonwealth} computer systems", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "69--71", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900424", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:WSa, author = "Anonymous", title = "What others are saying", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "72--73", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900436", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAa, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "74--82", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900448", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Ca, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "83--83", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990045X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PF, author = "Anonymous", title = "Pages 2--83 ({February 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "1", pages = "??--??", month = feb, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Eb, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "86--86", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990059X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:LE, author = "Anonymous", title = "Letters to the editor", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "87--90", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900606", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBb, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "91--100", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900618", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RV, author = "Harold Joseph Highland", title = "Reports from the victims", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "101--101", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990062X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Webster:1989:UDP, author = "Anne E. Webster", title = "{University} of {Delaware} and the {Pakistani} computer virus", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "103--105", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900631", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{vanWyk:1989:LV, author = "Kenneth R. van Wyk", title = "The {Lehigh} virus", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "107--110", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900643", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Radai:1989:IPV, author = "Yisrael Radai", title = "The {Israeli PC} virus", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "111--113", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900655", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1989:CVS, author = "Belden Menkus", title = "The computer virus situation is not encouraging", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "115--119", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900667", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRb, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "121--122", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900679", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Weber:1989:CEF, author = "Ron Weber", title = "Controls in electronic funds transfer systems: a survey and synthesis", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "123--137", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900680", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kruys:1989:SOS, author = "Jan P. Kruys", title = "Security of open systems", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "139--147", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900692", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1989:MPD, author = "Fred Cohen", title = "Models of practical defenses against computer viruses", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "149--160", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900709", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCb, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "161--162", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900710", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAb, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "163--172", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900722", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Cb, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "173--173", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900734", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PAa, author = "Anonymous", title = "Pages 86--173 ({April 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "2", pages = "??--??", month = apr, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:41 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Ec, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "176--177", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900990", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBc, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "178--188", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901004", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wood:1989:PMA, author = "Charles Cresson Wood", title = "Planning: a means to achieve data communications security", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "189--199", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901016", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1989:PSS, author = "Belden Menkus", title = "Physical security: Selecting an access control system", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "201--205", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901028", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRc, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "207--207", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990103X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Shain:1989:SEF, author = "M. Shain", title = "Security in electronic funds transfer: Message integrity in money transfer and bond settlements through {GE} information services' global network", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "209--221", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901041", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Keenan:1989:EVO, author = "Thomas P. Keenan", title = "Emerging vulnerabilities in office automation security", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "223--227", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901053", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Thomsen:1989:PEM, author = "D. J. Thomsen and W. T. Tsai and M. B. Thuraisingham", title = "Prototyping to explore {MLS\slash DBMS} design", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "229--245", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901065", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Fifield:1989:SOC, author = "Ken J. Fifield", title = "{Smartcards} outsmart computer crime", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "247--255", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901077", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCc, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "257--258", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901089", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAc, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "259--269", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901090", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Cc, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "270--270", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889901107", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PM, author = "Anonymous", title = "Pages 176--270 ({May 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "3", pages = "??--??", month = may, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Ed, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "272--273", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900850", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBd, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "274--282", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900862", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jamieson:1989:SCI, author = "Rodger Jamieson and Graham Low", title = "Security and control issues in local area network design", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "283--290", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900874", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mollema:1989:PDC, author = "Kor IJ. Mollema and Ad P. M. Smulders", title = "Prerequisites for data control", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "291--296", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900886", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Cohen:1989:CAC, author = "Fred Cohen", title = "Computational aspects of computer viruses", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "297--298", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900898", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCd, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "299--302", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900904", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{White:1989:VWC, author = "Clinton E. White", title = "Viruses and worms: a campus under attack", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "303--303", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900916", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gardner:1989:IWW, author = "Phillip E. Gardner", title = "The {Internet} worm: What was said and when", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "305--316", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900928", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zajac:1989:DRY, author = "Bernard P. Zajac", title = "Disaster recovery --- are you really ready?", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "317--323", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990093X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Hoffman:1989:SBA, author = "Lance J. Hoffman", title = "Smoking out the bad actors: Risk analysis in the age of the microcomputer", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "325--344", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900941", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRd, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "345--346", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900953", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:WSb, author = "Anonymous", title = "What others are saying", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "347--352", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900965", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAd, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "353--361", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900977", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Cd, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "363--363", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900989", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PJ, author = "Anonymous", title = "Pages 272--363 ({June 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "4", pages = "??--??", month = jun, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:42 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Ee, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "366--367", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900163", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBe, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "369--380", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900175", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{DeMaio:1989:VMI, author = "Harry B. DeMaio", title = "Viruses --- a management issue", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "381--388", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900187", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1989:TRD, author = "Belden Menkus", title = "{It}'s time to rethink data processing fire protection", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "389--394", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900199", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bologna:1989:TTR, author = "G. J. Bologna", title = "Twenty-two reasons why {MIS} subordinates don't measure up to their bosses' expectations", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "395--396", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900205", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRe, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "397--397", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900217", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Burk:1989:DPS, author = "Holger B{\"u}rk and Andreas Pfitzmann", title = "Digital payment systems enabling security and unobservability", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "399--416", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900229", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Boshoff:1989:PCM, author = "W. H. Boshoff and S. H. von Solms", title = "A path context model for addressing security in potentially non-secure environments", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "417--425", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900230", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wiseman:1989:PVC, author = "Simon Wiseman", title = "Preventing viruses in computer systems", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "427--432", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900242", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Badenhorst:1989:FML, author = "K. P. Badenhorst and Jan H. P. Eloff", title = "Framework of a methodology for the life cycle of computer security in an organization", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "433--442", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900254", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCe, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "443--444", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900266", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAe, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "445--455", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900278", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Ce, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "456--456", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990028X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PAb, author = "Anonymous", title = "Pages 366--456 ({August 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "5", pages = "??--??", month = aug, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highlands:1989:E, author = "Harold Joseph Highlands", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "458--459", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900746", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBf, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "460--478", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900758", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Gardner:1989:EFR, author = "Phillip E. Gardner", title = "Evaluation of five risk assessment programs", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "479--485", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990076X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1989:ERP, author = "Belden Menkus", title = "The employee's role in protecting information assets", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "487--492", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900771", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRf, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "493--493", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900783", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Harrold:1989:ISA, author = "C. L. Harrold", title = "An introduction to the {SMITE} approach to secure computing", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "495--505", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900795", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ramaswamy:1989:PDI, author = "Raju Ramaswamy", title = "Placement of data integrity security services in open systems interconnection architecture", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "507--516", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900801", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Keefe:1989:SSO, author = "T. F. Keefe and W. T. Tsai and M. B. Thuraisingham", title = "{SODA}: a secure object-oriented database system", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "517--533", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900813", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCf, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "535--536", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900825", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:ARAf, author = "Esther H. Highland", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "537--546", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900837", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Cf, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "547--548", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900849", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PO, author = "Anonymous", title = "Pages 458--548 ({October 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "6", pages = "??--??", month = oct, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:43 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:E, author = "Anonymous", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "550--552", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900461", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBg, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "553--561", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900473", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:SDI, author = "Harold Joseph Highland", title = "Secret disk {II} --- administrator", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "563--568", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900485", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Riddle:1989:PUU, author = "Bruce L. Riddle and Murray S. Miron and Judith A. Semo", title = "Passwords in use in a university timesharing environment", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "569--579", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900497", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Menkus:1989:CRF, author = "Belden Menkus", title = "Computer-related fire problems revisited", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "581--586", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900503", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jobusch:1989:SPMa, author = "David L. Jobusch and Arthur E. Oldehoeft", title = "A survey of password mechanisms: Weaknesses and potential {improvements.Part 1}", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "587--604", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900515", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRg, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "605--605", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900527", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Dehnad:1989:SWI, author = "Khosrow Dehnad", title = "A simple way of improving the login security", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "607--611", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900539", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pfleeger:1989:MPT, author = "Charles P. Pfleeger and Shari Lawrence Pfleeger and Mary Frances Theofanos", title = "A methodology for penetration testing", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "613--620", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900540", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bong:1989:OSI, author = "Dieter Bong and Christoph Ruland", title = "Optimized software implementations of the modular exponentiation on general purpose microprocessors", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "621--630", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900552", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCg, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "631--632", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900564", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ARAa, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "633--640", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900576", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Cg, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "641--642", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900588", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PN, author = "Anonymous", title = "Pages 550--642 ({November 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "7", pages = "??--??", month = nov, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:Ef, author = "Harold Joseph Highland", title = "From the editor", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "644--646", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900011", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:RBBh, author = "Harold Joseph Highland", title = "Random bits and bytes", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "647--657", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900023", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:DVN, author = "Harold Joseph Highland", title = "Datacrime virus and new anti-virus products", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "659--661", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900035", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Preston:1989:RV, author = "Charles M. Preston", title = "Review of {VIRUSCAN}", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "663--668", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900047", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Highland:1989:VVS, author = "Harold Joseph Highland", title = "{VCHECKER} --- a virus search program", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "669--674", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900059", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Jobusch:1989:SPMb, author = "David L. Jobusch and Arthur E. Oldehoeft", title = "A survey of password mechanisms: Weaknesses and potential {improvements.Part 2}", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "675--689", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900060", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:IBRh, author = "Anonymous", title = "International board of referees", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "691--691", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900072", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Varadharajan:1989:VNS, author = "Vijay Varadharajan", title = "Verification of network security protocols", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "693--708", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900084", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ramaswamy:1989:SAD, author = "Raju Ramaswamy", title = "Security architecture for data transfer through {TCP\slash IP} protocols", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "709--720", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900096", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Thuraisingham:1989:FVM, author = "M. B. Thuraisingham", title = "A functional view of multilevel databases", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "721--730", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900102", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ITCh, author = "Anonymous", title = "{IFIP} technical committee 11", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "731--732", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900114", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:ARAb, author = "Anonymous", title = "Abstracts of recent articles and literature", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "733--739", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900126", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:Ch, author = "Anonymous", title = "Calendar", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "741--741", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900138", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:AI, author = "Anonymous", title = "Author index", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "743--743", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488990014X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:SI, author = "Anonymous", title = "Subject index", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "745--749", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404889900151", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Anonymous:1989:PD, author = "Anonymous", title = "Pages 644--749 ({December 1989})", journal = j-COMPUT-SECUR, volume = "8", number = "8", pages = "??--??", month = dec, year = "1989", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:44 MDT 2019", bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", }