nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Collinson, Helen |
|
1994 |
13 |
4 |
p. 306-311 6 p. |
artikel |
2 |
A methodology to include computer security, safety and resilience requirements as part of the user requirement
|
Mostert, D.N.J. |
|
1994 |
13 |
4 |
p. 349-364 16 p. |
artikel |
3 |
Calendar
|
|
|
1994 |
13 |
4 |
p. 312-313 2 p. |
artikel |
4 |
Data interchange and legal security — signature surrogates
|
Rihaczek, Karl |
|
1994 |
13 |
4 |
p. 287-293 7 p. |
artikel |
5 |
Effect of key generators on the automatic search for flaws in key management schemes
|
Longley, D. |
|
1994 |
13 |
4 |
p. 335-347 13 p. |
artikel |
6 |
From the editor
|
|
|
1994 |
13 |
4 |
p. 276-277 2 p. |
artikel |
7 |
Guide for authors
|
|
|
1994 |
13 |
4 |
p. 368- 1 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
1994 |
13 |
4 |
p. 365-367 3 p. |
artikel |
9 |
Integrity in information systems — Executive summary
|
List, William |
|
1994 |
13 |
4 |
p. 295-301 7 p. |
artikel |
10 |
International board of referees
|
|
|
1994 |
13 |
4 |
p. 315- 1 p. |
artikel |
11 |
Letter to the editor
|
Lindballe, Jørgen |
|
1994 |
13 |
4 |
p. 303-305 3 p. |
artikel |
12 |
On the validity of the Bell-La Padula model
|
Roos Lindgreen, E.E.O. |
|
1994 |
13 |
4 |
p. 317-333 17 p. |
artikel |
13 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1994 |
13 |
4 |
p. 278-286 9 p. |
artikel |