nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A common criteria framework for the evaluation of information technology systems security
|
|
|
1997 |
16 |
3 |
p. 207- 1 p. |
artikel |
2 |
A comparison of schemes for certification authorities/trusted third parties
|
|
|
1997 |
16 |
3 |
p. 210- 1 p. |
artikel |
3 |
A compile-time model for safe information flow in object-oriented databases
|
|
|
1997 |
16 |
3 |
p. 206- 1 p. |
artikel |
4 |
A comprehensive need-to-know access control system and its application for medical information systems
|
|
|
1997 |
16 |
3 |
p. 209- 1 p. |
artikel |
5 |
A formal model to aid documenting and harmonizing of information security requirements
|
|
|
1997 |
16 |
3 |
p. 205-206 2 p. |
artikel |
6 |
Analysis
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 216- 1 p. |
artikel |
7 |
An attack detection system for secure computer systems-outline of the solution
|
|
|
1997 |
16 |
3 |
p. 207- 1 p. |
artikel |
8 |
A taxonomy of electronic case schemes
|
|
|
1997 |
16 |
3 |
p. 208- 1 p. |
artikel |
9 |
Authorship analysis: identifying the author of a program
|
Krsul, Ivan |
|
1997 |
16 |
3 |
p. 233-257 25 p. |
artikel |
10 |
Banks fear net losses
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 216-217 2 p. |
artikel |
11 |
Calender
|
|
|
1997 |
16 |
3 |
p. 219-220 2 p. |
artikel |
12 |
Can security baselines replace risk analysis?
|
|
|
1997 |
16 |
3 |
p. 206-207 2 p. |
artikel |
13 |
Code of practice: a standard for information security management
|
|
|
1997 |
16 |
3 |
p. 206- 1 p. |
artikel |
14 |
Computer disasters: prevention and recovery
|
|
|
1997 |
16 |
3 |
p. 187-188 2 p. |
artikel |
15 |
Confessing to the FBI
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 213- 1 p. |
artikel |
16 |
Constructing computer virus phylogenies
|
|
|
1997 |
16 |
3 |
p. 187- 1 p. |
artikel |
17 |
Controlling internet access at an educational institution
|
|
|
1997 |
16 |
3 |
p. 210- 1 p. |
artikel |
18 |
Data backup technology
|
|
|
1997 |
16 |
3 |
p. 188- 1 p. |
artikel |
19 |
Deriving authorization from process analysis in legacy information systems
|
|
|
1997 |
16 |
3 |
p. 206- 1 p. |
artikel |
20 |
Driving safely on the information highway
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 214-215 2 p. |
artikel |
21 |
Electronic borders: Defining and protecting national networks
|
Molini, James E. |
|
1997 |
16 |
3 |
p. 189-196 8 p. |
artikel |
22 |
Five rules for selling security
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 216- 1 p. |
artikel |
23 |
From the editor
|
|
|
1997 |
16 |
3 |
p. 178-179 2 p. |
artikel |
24 |
Hacker's brother changes his grades
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 214- 1 p. |
artikel |
25 |
Hackers hit AOL cybervirgins
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 213-214 2 p. |
artikel |
26 |
How to trust systems
|
|
|
1997 |
16 |
3 |
p. 210- 1 p. |
artikel |
27 |
Identity thieves place credit ratings at risk
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 213- 1 p. |
artikel |
28 |
IFIP/SEC'97 conference proceedings
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 205- 1 p. |
artikel |
29 |
IFIP TC 11 news
|
Highland, Dr.Harold Joseph |
|
1997 |
16 |
3 |
p. 211-212 2 p. |
artikel |
30 |
IFIP technical committee 11
|
|
|
1997 |
16 |
3 |
p. 259-261 3 p. |
artikel |
31 |
Integrating information security in the development of telematic systems
|
|
|
1997 |
16 |
3 |
p. 210- 1 p. |
artikel |
32 |
International Board of Referees
|
|
|
1997 |
16 |
3 |
p. 221-222 2 p. |
artikel |
33 |
Internet E-mail looks for security
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 215- 1 p. |
artikel |
34 |
Internet Explorer security flaws
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 217- 1 p. |
artikel |
35 |
Intruder alert
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 218- 1 p. |
artikel |
36 |
Labour to unlock encryption plans
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 214- 1 p. |
artikel |
37 |
Microsoft establishes security zones
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 215- 1 p. |
artikel |
38 |
New organizational forms for information security management
|
|
|
1997 |
16 |
3 |
p. 210- 1 p. |
artikel |
39 |
News scan
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 180-181 2 p. |
artikel |
40 |
New vistas on info-system security
|
|
|
1997 |
16 |
3 |
p. 207- 1 p. |
artikel |
41 |
Non-intrusive authentication
|
|
|
1997 |
16 |
3 |
p. 209- 1 p. |
artikel |
42 |
NTIS volumes of interest
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 187- 1 p. |
artikel |
43 |
Part of the foundation for secure systems: separation of duties policy
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 214- 1 p. |
artikel |
44 |
PGP is first to gain crypto approval
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 215- 1 p. |
artikel |
45 |
Pseudonymous audit for privacy enhanced intrusion detection
|
|
|
1997 |
16 |
3 |
p. 207- 1 p. |
artikel |
46 |
Public_key cryptosystems based on linear codes
|
|
|
1997 |
16 |
3 |
p. 187- 1 p. |
artikel |
47 |
Risk analysis: requirements, conflicts and problems
|
Ciechanowicz, Zbigniew |
|
1997 |
16 |
3 |
p. 223-232 10 p. |
artikel |
48 |
Roaming security agents enabling intelligent access control and network protection
|
|
|
1997 |
16 |
3 |
p. 209-210 2 p. |
artikel |
49 |
Secure communications now or later?
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 217- 1 p. |
artikel |
50 |
Secure VPNs
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 217-218 2 p. |
artikel |
51 |
Security in computing
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 181- 1 p. |
artikel |
52 |
Security requirements and solution in distributed electronic health records
|
|
|
1997 |
16 |
3 |
p. 208-209 2 p. |
artikel |
53 |
Security when outsourcing: concepts, constructs, compliance
|
|
|
1997 |
16 |
3 |
p. 208- 1 p. |
artikel |
54 |
Singapore tops software piracy list, survey shows
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 214- 1 p. |
artikel |
55 |
Tackling network security can be an uphill battle
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 217- 1 p. |
artikel |
56 |
The future of networks and network security
|
|
|
1997 |
16 |
3 |
p. 209- 1 p. |
artikel |
57 |
Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm
|
|
|
1997 |
16 |
3 |
p. 208- 1 p. |
artikel |
58 |
Virus scanners for multiple OSes
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 182-184 3 p. |
artikel |
59 |
Walking through the wall of fire
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 215- 1 p. |
artikel |
60 |
Web site directory
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 186-187 2 p. |
artikel |
61 |
What are the information security risks in decision support systems and data warehousing?
|
Finne, Thomas |
|
1997 |
16 |
3 |
p. 197-204 8 p. |
artikel |
62 |
Whom do you trust?
|
Meyer, Helen |
|
1997 |
16 |
3 |
p. 215- 1 p. |
artikel |
63 |
Why I bought a Compaq
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 184-186 3 p. |
artikel |
64 |
Year 2000
|
Highland, Harold Joseph |
|
1997 |
16 |
3 |
p. 181-182 2 p. |
artikel |