nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
6 |
p. 549-556 8 p. |
artikel |
2 |
A cryptographic key generation scheme for multilevel data security
|
Harn, Lein |
|
1990 |
9 |
6 |
p. 539-546 8 p. |
artikel |
3 |
Application access control standards for distributed systems
|
Parker, T.A. |
|
1990 |
9 |
6 |
p. 519-528 10 p. |
artikel |
4 |
Conference roundup
|
|
|
1990 |
9 |
6 |
p. 513-516 4 p. |
artikel |
5 |
Confessions of a security consultant
|
Jackson, Keith |
|
1990 |
9 |
6 |
p. 509-511 3 p. |
artikel |
6 |
Control of confidentiality in databases
|
Wiseman, Simon |
|
1990 |
9 |
6 |
p. 529-537 9 p. |
artikel |
7 |
From the editor
|
|
|
1990 |
9 |
6 |
p. 468-469 2 p. |
artikel |
8 |
How VMS keeps out intruders
|
Candia, Tanya |
|
1990 |
9 |
6 |
p. 499-502 4 p. |
artikel |
9 |
International board of referees
|
|
|
1990 |
9 |
6 |
p. 517- 1 p. |
artikel |
10 |
Preliminary list of exhibitors for compsec international '90
|
|
|
1990 |
9 |
6 |
p. 559-561 3 p. |
artikel |
11 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1990 |
9 |
6 |
p. 470-482 13 p. |
artikel |
12 |
Security and credibility in an information-intensive society
|
Carroll, John M. |
|
1990 |
9 |
6 |
p. 489-498 10 p. |
artikel |
13 |
Spectacular computer crimes—what they are and how they cost American business half a billion dollars a year!
|
Wood, Charles Creson |
|
1990 |
9 |
6 |
p. 557- 1 p. |
artikel |
14 |
The 1990s—what will they hold?
|
Zajac Jr., Bernard P. |
|
1990 |
9 |
6 |
p. 503-507 5 p. |
artikel |
15 |
Why data communications are insecure
|
Menkus, Belden |
|
1990 |
9 |
6 |
p. 483-487 5 p. |
artikel |