nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control systems: from host-centric to net-work centric computing
|
|
|
1996 |
15 |
5 |
p. 402- 1 p. |
artikel |
2 |
An attack detection systems for secure computer systems — Design of the ADS
|
|
|
1996 |
15 |
5 |
p. 395- 1 p. |
artikel |
3 |
An hierarchical threshold scheme with unique partial keys
|
|
|
1996 |
15 |
5 |
p. 393- 1 p. |
artikel |
4 |
A policy for sending secret information over communications networks
|
|
|
1996 |
15 |
5 |
p. 400- 1 p. |
artikel |
5 |
Approach to object security in Distributed SOM
|
|
|
1996 |
15 |
5 |
p. 402- 1 p. |
artikel |
6 |
A practical framework for secure corporate teleworking
|
|
|
1996 |
15 |
5 |
p. 410- 1 p. |
artikel |
7 |
Ask stupid questions; Listen for the unsaid: the EDP auditor as consultant
|
|
|
1996 |
15 |
5 |
p. 409- 1 p. |
artikel |
8 |
A taxonomy for analyzing hazards to information systems
|
|
|
1996 |
15 |
5 |
p. 395- 1 p. |
artikel |
9 |
Authenticating passwords over an insecure channel
|
Tzong-Chen, Wu |
|
1996 |
15 |
5 |
p. 431-439 9 p. |
artikel |
10 |
Beware of a macro virus epidemic
|
|
|
1996 |
15 |
5 |
p. 398- 1 p. |
artikel |
11 |
Blaming the victim
|
|
|
1996 |
15 |
5 |
p. 418- 1 p. |
artikel |
12 |
Blind date — problems with the year 2000
|
|
|
1996 |
15 |
5 |
p. 418- 1 p. |
artikel |
13 |
Business continuity planning
|
|
|
1996 |
15 |
5 |
p. 411- 1 p. |
artikel |
14 |
Calender
|
|
|
1996 |
15 |
5 |
p. 403-404 2 p. |
artikel |
15 |
Cashless cybercrime
|
|
|
1996 |
15 |
5 |
p. 414- 1 p. |
artikel |
16 |
CIPFA survey of IT audit in UK public service organizations 1996
|
|
|
1996 |
15 |
5 |
p. 413- 1 p. |
artikel |
17 |
Closing the loopholes in host-based authentication
|
|
|
1996 |
15 |
5 |
p. 414- 1 p. |
artikel |
18 |
COMPSEC '96 exhibitors
|
|
|
1996 |
15 |
5 |
p. 419-420 2 p. |
artikel |
19 |
Computer evidence: an overview of forensic procedures, tools and techniques
|
|
|
1996 |
15 |
5 |
p. 417- 1 p. |
artikel |
20 |
Computer security in China
|
Heinlein, Edwin B. |
|
1996 |
15 |
5 |
p. 369-375 7 p. |
artikel |
21 |
Cooperating security managers: Distributed intrusion detection systems
|
White, Gregory |
|
1996 |
15 |
5 |
p. 441-450 10 p. |
artikel |
22 |
Corporate governance & IT
|
|
|
1996 |
15 |
5 |
p. 406- 1 p. |
artikel |
23 |
Countering chip theft
|
|
|
1996 |
15 |
5 |
p. 410- 1 p. |
artikel |
24 |
Cryptographic key distribution and authentication protocols for secure group communication
|
|
|
1996 |
15 |
5 |
p. 396- 1 p. |
artikel |
25 |
Crypto system initialization: Simplifying the distribution of initial keys
|
|
|
1996 |
15 |
5 |
p. 406- 1 p. |
artikel |
26 |
Danger! Deadly new computer viruses want to kill your PC
|
|
|
1996 |
15 |
5 |
p. 400- 1 p. |
artikel |
27 |
Dealing with a unix system penetration
|
|
|
1996 |
15 |
5 |
p. 409-410 2 p. |
artikel |
28 |
Disaster recovery: The people issues
|
|
|
1996 |
15 |
5 |
p. 411- 1 p. |
artikel |
29 |
Distributed registration and key distribution (DiRK)
|
|
|
1996 |
15 |
5 |
p. 394-395 2 p. |
artikel |
30 |
Does Microsoft have security all locked up?
|
|
|
1996 |
15 |
5 |
p. 399- 1 p. |
artikel |
31 |
Doing business on the Internet: marketing and security aspects
|
|
|
1996 |
15 |
5 |
p. 400- 1 p. |
artikel |
32 |
Efficient and probably secure key agreement
|
|
|
1996 |
15 |
5 |
p. 394- 1 p. |
artikel |
33 |
Electronic communications risk management: A checklist for business managers
|
Moulton, Rolf T. |
|
1996 |
15 |
5 |
p. 377-386 10 p. |
artikel |
34 |
Elite panel slams US crypto policy
|
|
|
1996 |
15 |
5 |
p. 397- 1 p. |
artikel |
35 |
Factors in the selection of a risk assessment method
|
|
|
1996 |
15 |
5 |
p. 401- 1 p. |
artikel |
36 |
Feds turn blind eye to systems security
|
|
|
1996 |
15 |
5 |
p. 401- 1 p. |
artikel |
37 |
From the editor
|
|
|
1996 |
15 |
5 |
p. 354-355 2 p. |
artikel |
38 |
Fundamental DES design concepts
|
|
|
1996 |
15 |
5 |
p. 406- 1 p. |
artikel |
39 |
GSSP (Generally-Accepted system Security Principles): A trip to abilene
|
|
|
1996 |
15 |
5 |
p. 417- 1 p. |
artikel |
40 |
IFIP/SEC'96 conference proceeding
|
|
|
1996 |
15 |
5 |
p. 393- 1 p. |
artikel |
41 |
IFIP TC 11 news
|
Highland, Dr.Harold Joseph |
|
1996 |
15 |
5 |
p. 387-390 4 p. |
artikel |
42 |
IFIP technical committee 11
|
|
|
1996 |
15 |
5 |
p. 451-453 3 p. |
artikel |
43 |
In defence of MoD IT privatization
|
|
|
1996 |
15 |
5 |
p. 399- 1 p. |
artikel |
44 |
Industry to Clinton: drop encryption policy
|
|
|
1996 |
15 |
5 |
p. 397-398 2 p. |
artikel |
45 |
Information owners, custodians and users
|
|
|
1996 |
15 |
5 |
p. 401- 1 p. |
artikel |
46 |
Information warfare: Your company needs you!
|
|
|
1996 |
15 |
5 |
p. 414- 1 p. |
artikel |
47 |
Intelligent security reporting — auditing security logs
|
|
|
1996 |
15 |
5 |
p. 417-418 2 p. |
artikel |
48 |
Intention modelling: Approximating computer user intentions for detection and prediction of intrusions
|
|
|
1996 |
15 |
5 |
p. 395- 1 p. |
artikel |
49 |
International Board of referees
|
|
|
1996 |
15 |
5 |
p. 429-430 2 p. |
artikel |
50 |
Internet security — firewall horror stories
|
|
|
1996 |
15 |
5 |
p. 405- 1 p. |
artikel |
51 |
Internet = Virusnet?
|
|
|
1996 |
15 |
5 |
p. 406- 1 p. |
artikel |
52 |
Internetwork access control using public key certificates
|
|
|
1996 |
15 |
5 |
p. 394- 1 p. |
artikel |
53 |
Intranet as an audit resource
|
|
|
1996 |
15 |
5 |
p. 413- 1 p. |
artikel |
54 |
Intranet security
|
|
|
1996 |
15 |
5 |
p. 405- 1 p. |
artikel |
55 |
Is encryption the road to security?
|
|
|
1996 |
15 |
5 |
p. 401- 1 p. |
artikel |
56 |
IT security and privacy education
|
|
|
1996 |
15 |
5 |
p. 395-396 2 p. |
artikel |
57 |
IT security is a business issue not a technical one
|
|
|
1996 |
15 |
5 |
p. 411- 1 p. |
artikel |
58 |
It's the Infrastructure, stupid
|
|
|
1996 |
15 |
5 |
p. 413- 1 p. |
artikel |
59 |
Keeping it legit
|
|
|
1996 |
15 |
5 |
p. 399- 1 p. |
artikel |
60 |
Mobile state — challenges for the 21st century
|
|
|
1996 |
15 |
5 |
p. 413- 1 p. |
artikel |
61 |
MoFAC: A model for fine-grained access control
|
|
|
1996 |
15 |
5 |
p. 395- 1 p. |
artikel |
62 |
Net porn prosecutions would be a ‘nightmare’
|
Meyer, Helen |
|
1996 |
15 |
5 |
p. 397- 1 p. |
artikel |
63 |
Network disaster contingency planning
|
|
|
1996 |
15 |
5 |
p. 411- 1 p. |
artikel |
64 |
One company's roadmap to securing it's intranet
|
|
|
1996 |
15 |
5 |
p. 414- 1 p. |
artikel |
65 |
Password master
|
|
|
1996 |
15 |
5 |
p. 397- 1 p. |
artikel |
66 |
Practical application of high level risk analysis and security healthchecks for telecommunications systems
|
|
|
1996 |
15 |
5 |
p. 410- 1 p. |
artikel |
67 |
Privacy and the internet
|
|
|
1996 |
15 |
5 |
p. 398- 1 p. |
artikel |
68 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1996 |
15 |
5 |
p. 356-366 11 p. |
artikel |
69 |
Reviewing and assessing IT projects under development
|
|
|
1996 |
15 |
5 |
p. 409- 1 p. |
artikel |
70 |
Right sizing without capsizing
|
|
|
1996 |
15 |
5 |
p. 409- 1 p. |
artikel |
71 |
SALSA: A method for developing the enterprise security architecture and strategy
|
|
|
1996 |
15 |
5 |
p. 406- 1 p. |
artikel |
72 |
SAP — Control and fraud prevention strategies
|
|
|
1996 |
15 |
5 |
p. 411- 1 p. |
artikel |
73 |
Secure IP access at last with virtual TCP Online
|
|
|
1996 |
15 |
5 |
p. 399- 1 p. |
artikel |
74 |
Securely executing multilevel transactions
|
|
|
1996 |
15 |
5 |
p. 394- 1 p. |
artikel |
75 |
Securing remote access to corporate systems
|
|
|
1996 |
15 |
5 |
p. 414- 1 p. |
artikel |
76 |
Security issues in the virtual corporation
|
|
|
1996 |
15 |
5 |
p. 405-406 2 p. |
artikel |
77 |
Security profile for interconnected open distributed systems with varying vulnerability
|
|
|
1996 |
15 |
5 |
p. 396- 1 p. |
artikel |
78 |
Smartcards — is Britain smart enough
|
|
|
1996 |
15 |
5 |
p. 417- 1 p. |
artikel |
79 |
Software quality assurance: The underlying framework for achieving secure and reliable software systems
|
|
|
1996 |
15 |
5 |
p. 394- 1 p. |
artikel |
80 |
Some observations on vulnerabilities
|
|
|
1996 |
15 |
5 |
p. 405- 1 p. |
artikel |
81 |
Tales from the crypt
|
|
|
1996 |
15 |
5 |
p. 400- 1 p. |
artikel |
82 |
Telecommunications fraud the evolving threat
|
|
|
1996 |
15 |
5 |
p. 410- 1 p. |
artikel |
83 |
Testing your plan is more important than the plan itself
|
|
|
1996 |
15 |
5 |
p. 400- 1 p. |
artikel |
84 |
The new information security age — electronic commerce & trusted third parties
|
|
|
1996 |
15 |
5 |
p. 409- 1 p. |
artikel |
85 |
The secret war
|
|
|
1996 |
15 |
5 |
p. 398-399 2 p. |
artikel |
86 |
The truth behind single sign-on
|
|
|
1996 |
15 |
5 |
p. 417- 1 p. |
artikel |
87 |
Web server: security lockdown
|
|
|
1996 |
15 |
5 |
p. 401-402 2 p. |
artikel |