nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Collinson, Helen |
|
1994 |
13 |
8 |
p. 651-656 6 p. |
artikel |
2 |
Access control with binary keys
|
Chang, Chin-Chen |
|
1994 |
13 |
8 |
p. 681-686 6 p. |
artikel |
3 |
A computer package for measuring the strength of encryption algorithms
|
Gustafson, H. |
|
1994 |
13 |
8 |
p. 687-697 11 p. |
artikel |
4 |
Calendar
|
|
|
1994 |
13 |
8 |
p. 657- 1 p. |
artikel |
5 |
Design for dynamic user-role-based security
|
Mohammed, Imtiaz |
|
1994 |
13 |
8 |
p. 661-671 11 p. |
artikel |
6 |
Development of security policies
|
Ølnes, Jon |
|
1994 |
13 |
8 |
p. 628-636 9 p. |
artikel |
7 |
From the editor
|
|
|
1994 |
13 |
8 |
p. 620-621 2 p. |
artikel |
8 |
Guide for authors
|
|
|
1994 |
13 |
8 |
p. 702- 1 p. |
artikel |
9 |
IFIP technical committee 11
|
|
|
1994 |
13 |
8 |
p. 699-701 3 p. |
artikel |
10 |
International board of referees
|
|
|
1994 |
13 |
8 |
p. 659- 1 p. |
artikel |
11 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1994 |
13 |
8 |
p. 622-627 6 p. |
artikel |
12 |
Security evaluation in information technology standards
|
Gentile, Francesco |
|
1994 |
13 |
8 |
p. 647-650 4 p. |
artikel |
13 |
The cyberpunk age
|
Lindup, Ken |
|
1994 |
13 |
8 |
p. 637-645 9 p. |
artikel |
14 |
The management of computer security profiles using a role-oriented approach
|
von Solms, S.H. |
|
1994 |
13 |
8 |
p. 673-680 8 p. |
artikel |