nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1986 |
5 |
2 |
p. 150-164 15 p. |
artikel |
2 |
A pauper's callback scheme
|
Bishop, Matt |
|
1986 |
5 |
2 |
p. 141-144 4 p. |
artikel |
3 |
Authentication in a heterogeneous environment
|
Power, JuneM. |
|
1986 |
5 |
2 |
p. 167- 1 p. |
artikel |
4 |
“Back door” trespassing
|
|
|
1986 |
5 |
2 |
p. 94- 1 p. |
artikel |
5 |
Calendar
|
|
|
1986 |
5 |
2 |
p. 177-178 2 p. |
artikel |
6 |
Computer security — Prevention: Lessons from the operation of a nuclear power plant
|
Hoebeke, L. |
|
1986 |
5 |
2 |
p. 122-127 6 p. |
artikel |
7 |
Concepts of protection in the IFIP WG 2.7 reference model for command and response languages
|
Kugler, Han-Jürgen |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
8 |
CRYPTO '85
|
|
|
1986 |
5 |
2 |
p. 170-176 7 p. |
artikel |
9 |
Data security in a relational database environment
|
van der Lans, R.F. |
|
1986 |
5 |
2 |
p. 128-134 7 p. |
artikel |
10 |
Decision support systems - A necessity for effective auditing of controls
|
Tener, WilliamT. |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
11 |
Design of a secure relational data base
|
Carroll, JohnM. |
|
1986 |
5 |
2 |
p. 167- 1 p. |
artikel |
12 |
Development and organization of the audit and security functions
|
Beatson, JohnG. |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
13 |
Educating computer crime investigators
|
Stanley, PhilipM. |
|
1986 |
5 |
2 |
p. 168-169 2 p. |
artikel |
14 |
Electromagnetic radiation revisited
|
Highland, Harold Joseph |
|
1986 |
5 |
2 |
p. 85-93 9 p. |
artikel |
15 |
Emerging privacy issues
|
Ware, Willis H. |
|
1986 |
5 |
2 |
p. 101-113 13 p. |
artikel |
16 |
Emerging privacy issues
|
Ware, WillisH. |
|
1986 |
5 |
2 |
p. 167- 1 p. |
artikel |
17 |
Establishing technical systems security standards at a large multinational bank
|
Wood, CharlesCresson |
|
1986 |
5 |
2 |
p. 169- 1 p. |
artikel |
18 |
How to use the DES safely
|
Davies, DonaldW. |
|
1986 |
5 |
2 |
p. 169- 1 p. |
artikel |
19 |
IBM dynamic signature verification
|
Worthington, T.K. |
|
1986 |
5 |
2 |
p. 167-168 2 p. |
artikel |
20 |
Intergrating security activities into the software development life cycle and the software quality assurance process
|
Tompkins, FrederickG. |
|
1986 |
5 |
2 |
p. 167- 1 p. |
artikel |
21 |
In this issue…
|
Highland, HaroldJoseph |
|
1986 |
5 |
2 |
p. 83- 1 p. |
artikel |
22 |
New member of the International Board of Editors
|
Essen, Johan |
|
1986 |
5 |
2 |
p. 84- 1 p. |
artikel |
23 |
On a serious (?) note
|
|
|
1986 |
5 |
2 |
p. 99- 1 p. |
artikel |
24 |
On cryptographic protection of capabilities
|
|
|
1986 |
5 |
2 |
p. 98-99 2 p. |
artikel |
25 |
On the key storage requirements for secure terminals
|
Jansen, C.J.A. |
|
1986 |
5 |
2 |
p. 145-149 5 p. |
artikel |
26 |
Producing reliable, secure software
|
Murine, GeraldE. |
|
1986 |
5 |
2 |
p. 169- 1 p. |
artikel |
27 |
Risk management — a key to security in the electronic funds transfer system
|
Richards, Roy Martin |
|
1986 |
5 |
2 |
p. 135-140 6 p. |
artikel |
28 |
Security for small business computers
|
Kingston, PeterP.C.H. |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
29 |
Security modules: Potent information security system components
|
Wood, Charles Cresson |
|
1986 |
5 |
2 |
p. 114-121 8 p. |
artikel |
30 |
Security of electronic transactions
|
Ekerbrink, Ivan |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
31 |
Security reminders
|
|
|
1986 |
5 |
2 |
p. 97-98 2 p. |
artikel |
32 |
Software versus hardware encryption - Is there any difference today?
|
Fåk, Viiveke |
|
1986 |
5 |
2 |
p. 167- 1 p. |
artikel |
33 |
Some suggested reading
|
|
|
1986 |
5 |
2 |
p. 97- 1 p. |
artikel |
34 |
Technology watch
|
|
|
1986 |
5 |
2 |
p. 94-97 4 p. |
artikel |
35 |
The audit, control and security of the project life cycle - Pre-implementation stage
|
Doswell, RogerT. |
|
1986 |
5 |
2 |
p. 168- 1 p. |
artikel |
36 |
WG 11:4 status report
|
|
|
1986 |
5 |
2 |
p. 165-166 2 p. |
artikel |