nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1992 |
11 |
1 |
p. 93-103 11 p. |
artikel |
2 |
A high rise building fire case study
|
Menkus, Belden |
|
1992 |
11 |
1 |
p. 19-23 5 p. |
artikel |
3 |
An automatic search for security flaws in key management schemes
|
Longley, D. |
|
1992 |
11 |
1 |
p. 75-89 15 p. |
artikel |
4 |
A protection model incorporating both authorization and constraints
|
Laribi, Atika |
|
1992 |
11 |
1 |
p. 57-73 17 p. |
artikel |
5 |
Calendar
|
|
|
1992 |
11 |
1 |
p. 104-105 2 p. |
artikel |
6 |
Computer viral risks—how bad is the threat?
|
Zajac Jr., Bernard P. |
|
1992 |
11 |
1 |
p. 29-34 6 p. |
artikel |
7 |
Conference report: Compsec international '91
|
|
|
1992 |
11 |
1 |
p. 16-17 2 p. |
artikel |
8 |
Distributed systems security
|
Sherman, Robin L. |
|
1992 |
11 |
1 |
p. 24-28 5 p. |
artikel |
9 |
Editorial Board
|
|
|
1992 |
11 |
1 |
p. 2- 1 p. |
artikel |
10 |
From the editor
|
|
|
1992 |
11 |
1 |
p. 2-3 2 p. |
artikel |
11 |
Guide for authors
|
|
|
1992 |
11 |
1 |
p. 106- 1 p. |
artikel |
12 |
IFIP TC11 news
|
Highland, HaroldJoseph |
|
1992 |
11 |
1 |
p. 35-38 4 p. |
artikel |
13 |
IFIP technical committee 11
|
|
|
1992 |
11 |
1 |
p. 91-92 2 p. |
artikel |
14 |
International board of referees
|
|
|
1992 |
11 |
1 |
p. 39- 1 p. |
artikel |
15 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1992 |
11 |
1 |
p. 4-15 12 p. |
artikel |
16 |
Security in database systems: A research perspective
|
Lunt, Teresa F. |
|
1992 |
11 |
1 |
p. 41-56 16 p. |
artikel |