@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-COMPUT-SECUR = "Computers \& Security"}
@Article{Highland:1982:Ea,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "1--2",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900189",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:IBE,
author = "Anonymous",
title = "International board of editors",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "3--8",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900190",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fordyce:1982:CSC,
author = "Samantha Fordyce",
title = "Computer security: a current assessment",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "9--16",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900207",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Perry:1982:DCS,
author = "William E. Perry",
title = "Developing a computer security and control strategy",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "17--26",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900219",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guillou:1982:CT,
author = "L. C. Guillou and B. Lorig",
title = "Cryptography and teleinformatics",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "27--33",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900220",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Friedman:1982:CDP,
author = "Stanley Friedman",
title = "Contingency and disaster planning",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "34--40",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900232",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{BloomBecker:1982:ICC,
author = "Jay BloomBecker",
title = "International computer crime: Where terrorism and
transborder data flow meet",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "41--53",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900244",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Porter:1982:PEI,
author = "Sigmund N. Porter",
title = "A password extension for improved human factors",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "54--56",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900256",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kurzban:1982:SBA,
author = "Stanley A. Kurzban",
title = "A selective, briefly annotated bibliography of works
on data security and privacy",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "57--64",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1982:FAC,
author = "Charles Cresson Wood",
title = "Future applications of cryptography",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "65--71",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488290027X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Willett:1982:TPK,
author = "Michael Willett",
title = "A tutorial on public key cryptography",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "72--79",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900281",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Henry:1982:FDA,
author = "Paul S. Henry",
title = "Fast decryption algorithm for the knapsack cipher",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "80--83",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900293",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:BRCa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Cryptography: a primer}}:
Alan G. Konheim: New York: John Wiley and Sons,
1981. xiv + 432 pp. \$34.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "84--84",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488290030X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:BRCb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Computer control and
security: a guide for managers and systems analysts}}:
William E. Perry: New York: John Wiley and Sons,
1981. xiii + 207 pp. \$22.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "85--85",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:CLA,
author = "Anonymous",
title = "Current literature: Abstracts of recent articles and
literature",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "86--91",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900323",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "92--94",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900335",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "ifc--ifc",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900177",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:PJa,
author = "Anonymous",
title = "Pages 1--94 ({January 1982})",
journal = j-COMPUT-SECUR,
volume = "1",
number = "1",
pages = "??--??",
month = jan,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:06 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:Eb,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "95--95",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900013",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:NMI,
author = "Anonymous",
title = "New members of the international board of editors",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "97--98",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900025",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Courtney:1982:SAD,
author = "Robert H. Courtney",
title = "A systematic approach to data security",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "99--112",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900037",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Blom:1982:SMD,
author = "Rolf Blom and Jan-Olof Br{\"u}er and Viiveke F{\aa}k
and S. Ingvar {\AA}kersten",
title = "On security measures in distributed computer systems",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "113--122",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900049",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1982:CCB,
author = "John M. Carroll",
title = "The control of computer-based fraud",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "123--138",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900050",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1982:PDC,
author = "Charles Cresson Wood",
title = "Policies for deterring computer abuse",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "139--145",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900062",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moulton:1982:MAI,
author = "Rolf Moulton",
title = "A multidisciplinary approach to the investigation of
computer abuse incidents",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "146--151",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900074",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Neugent:1982:TCS,
author = "William Neugent",
title = "Teaching computer security: a course outline",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "152--163",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900086",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:GNC,
author = "Esther Harris Highland and Harold Joseph Highland",
title = "A guide to {NBS} computer security literature",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "164--176",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900098",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Willett:1982:CON,
author = "Michael Willett",
title = "Cryptography old and new",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "177--186",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900104",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:POC,
author = "Anonymous",
title = "Professional organizations in computer security",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "187--190",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900116",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:BRMa,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{Managing information
security: a program for the electronic information
age}}: James A. Schweitzer Boston: Butterworth
(Publishers), Inc., 1982. vi + 133 pp. \$15.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "191--191",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900128",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:BRMb,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{Management guide to computer
security}}: J. R. Talbot, New York: John Wiley and
Sons, 1981. xi + 180 pp. \$29.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "191--192",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488290013X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:SSS,
author = "Esther H. Highland",
title = "{System security standard for electronic data
processing: Rolf Moulton New York: the city of New
York, 1981. \$7.50}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "192--192",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900141",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "193--199",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900153",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "200--200",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:PJb,
author = "Anonymous",
title = "Pages 95--200 ({June 1982})",
journal = j-COMPUT-SECUR,
volume = "1",
number = "2",
pages = "??--??",
month = jun,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:07 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murray:1982:SPP,
author = "William Hugh Murray",
title = "Security procedures for program libraries",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "201--209",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900347",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shaw:1982:EGA,
author = "James K. Shaw and Stuart W. Katzke",
title = "An executive guide to {ADP} contingency planning",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "210--215",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900359",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ball:1982:DRS,
author = "Leslie D. Ball and Gail Dentch and Mary Emerson and
Martha Lewis and Susan McWhorter and Frank Turgeon",
title = "Disaster recovery services",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "216--225",
month = nov,
year = "1982",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/0167-4048(82)90036-0",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900360",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Linden:1982:SEM,
author = "Christer Lind{\'e}n and Hans Block",
title = "Sealing electronic money in {Sweden}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "226--230",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900372",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Reed:1982:RTY,
author = "Susan K. Reed and Dennis K. Branstad",
title = "Reflections on ten years of computer security",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "231--232",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900384",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:EGC,
author = "Anonymous",
title = "Executive guide to computer security",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "233--241",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1982:EN,
author = "Harold Joseph Highland",
title = "{Editor}'s note",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "242--242",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900402",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Willett:1982:GE,
author = "Michael Willett",
title = "Guest editorial",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "243--244",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900414",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kahn:1982:GLC,
author = "David Kahn",
title = "The grand lines of cryptology's development",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "245--248",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900426",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Buck:1982:PCS,
author = "R. Creighton Buck",
title = "The public cryptography study group",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "249--254",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900438",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Branstad:1982:ISS,
author = "Dennis K. Branstad and Miles E. Smid",
title = "Integrity and security standards based on
cryptography",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "255--260",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488290044X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Banerjee:1982:HSI,
author = "Subodh K. Banerjee",
title = "High speed implementation of {DES}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "261--267",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900451",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schanning:1982:APK,
author = "Brian P. Schanning",
title = "Applying public key distribution to local area
networks",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "268--274",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900463",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jayant:1982:ASS,
author = "N. S. Jayant",
title = "Analog scramblers for speech privacy",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "275--289",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900475",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{RFB:1982:BRMa,
author = "RFB",
title = "Book Review: {{\booktitle{Management guide to computer
security}}: J. P. Talbot, New York: John Wiley and
Sons, 1981. xi + 180 pp. \$29.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "290--291",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{RFB:1982:BRMb,
author = "RFB",
title = "Book Review: {{\booktitle{Multi-national computer
systems: an introduction to transnational data flow and
data regulation}}: Harry S. Katzan, Jr.: New York: Van
Nostrand Reinhold Co., 1980. xii + 198 pp. \$16.95}",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "291--292",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "293--297",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "298--298",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900517",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:SIV,
author = "Anonymous",
title = "Subject index to volume 1",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "299--302",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900529",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:AIV,
author = "Anonymous",
title = "Author index to volume 1",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "303--304",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404882900530",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1982:PN,
author = "Anonymous",
title = "Pages 201--304 ({November 1982})",
journal = j-COMPUT-SECUR,
volume = "1",
number = "3",
pages = "??--??",
month = nov,
year = "1982",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:Ea,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "1--2",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900263",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:TNM,
author = "Anonymous",
title = "Three new members of the International Board of
{Editors}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "3--4",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900275",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1983:EISa,
author = "Charles Cresson Wood",
title = "Effective information system security with password
controls",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "5--10",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900287",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1983:NTD,
author = "Belden Menkus",
title = "Notes on terrorism and data processing",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "11--15",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900299",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murray:1983:CSO,
author = "William H. Murray",
title = "Computer security: Observations on the state of the
technology",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "16--23",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900305",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Caroll:1983:MSA,
author = "John M. Caroll and Oi-Lun Wu",
title = "Methodology for security analysis of data-processing
systems",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "24--34",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900317",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Backwith:1983:UAS,
author = "Nigel Backwith",
title = "Unique approach to security evaluation",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "35--40",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900329",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weingarten:1983:CCP,
author = "F. Weingarten",
title = "Controlling cryptographic publication",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "41--48",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900330",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bussolati:1983:TNA,
author = "U. Bussolati and G. Martella",
title = "Towards a new approach to secure database design",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "49--62",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900342",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goldstein:1983:CCP,
author = "Bruce Goldstein",
title = "Computer crime and its prevention",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "63--66",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900354",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cerullo:1983:DCC,
author = "Michael J. Cerullo",
title = "Data communications controls",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "67--72",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900366",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guynes:1983:EIC,
author = "Steve Guynes",
title = "{EFTS} impact on computer security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "73--77",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900378",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callaghan:1983:SDW,
author = "David R. Callaghan",
title = "Securing the distributed word processing network",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "78--81",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390038X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:BRH,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{The hut six story: Breaking
the Enigma codes}}: Gordon Welchman: London: Allen Lane
(Penguin Books, Ltd) and New York: McGraw Hill Book
Co., Inc., 1982. $x$ + 326 pp., \$12.95}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "82--83",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900391",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:BRCa,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{CBEMA privacy and security
bibliography (October 1982)}}: Rein Turn, editor:
Washington DC: Computer and Business Equipment
Manufacturers Association, 1982, iii + 51 pp.}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "83--83",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900408",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:BRCb,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{Codes, ciphers and
computers: an introduction to information security}}:
Bruce Bosworth: Rochelle Park NJ: Hayden Book Company,
Inc., 1982. viii + 259 pp., \$13.95}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "83--84",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390041X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:BRA,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{Advances in computer system
security}}: Rein Turn, editor: Dedham MA: Artech House,
Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences,
PO Box 181, Wellesley, MA 02181, USA) \$29.50}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "84--84",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900421",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:BRT,
author = "Harold Joseph Highland",
title = "Book Review: {{\booktitle{Tutorial: the security of
data in networks}}: Donald W. Davies: Silver Spring MD:
IEEE Computer Society, 1981. vi + 241 pp., \$20.00 to
non-members and \$15.00 to members of IEEE}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "84--84",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900433",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:OTA,
author = "Anonymous",
title = "The {Office} of Technology Assessment reports",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "85--87",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900445",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "88--96",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900457",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "97--98",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900469",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "ifc--ifc",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900251",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:PJa,
author = "Anonymous",
title = "Pages 1--98 ({January 1983})",
journal = j-COMPUT-SECUR,
volume = "2",
number = "1",
pages = "??--??",
month = jan,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:IS,
author = "Anonymous",
title = "{IFIP\slash Sec '83}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "99--101",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900470",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bound:1983:MRA,
author = "William A. J. Bound and Dennis R. Ruth",
title = "Making risk analysis a useful management tool with
microcomputer electronic worksheet packages",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "102--115",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900482",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beckman:1983:IFS,
author = "Kristian Beckman",
title = "{IFIP}'s first security congress: the multi-million
step",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "117--119",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900494",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:ISI,
author = "Anonymous",
title = "{IFIP\slash Sec '83} --- {IFIP}'s First Security
Conference",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "120--131",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900500",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Warren:1983:ERC,
author = "Andrew D. Warren",
title = "Evaluating the risks of computer fraud and error",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "132--143",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900512",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1983:SSV,
author = "Ronal Paans and Guus Bonnes",
title = "Surreptitious security violation in the {MVS}
operating system",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "144--152",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900524",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bonyun:1983:UAP,
author = "David A. Bonyun",
title = "The use of architectural principles in the design of
certifiably secure systems",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "153--162",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900536",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoving:1983:IAC,
author = "Per L. Hoving",
title = "To install an Access Control System, activities and
checklists",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "163--170",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900548",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:IMT,
author = "Harold Joseph Highland",
title = "Impact of microcomputers on total computer security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "171--183",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390055X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:POCa,
author = "Anonymous",
title = "Professional organizations in computer security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "184--185",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900561",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:CCB,
author = "Anonymous",
title = "Computer crime: {Bureau of Justice Statistics, U.S.
Department of Justice}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "186--188",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900573",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:CST,
author = "Esther H. Highland",
title = "Computer Security Techniques: List of controls by
cost",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "189--193",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900585",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "194--205",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900597",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "206--211",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900603",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:PJb,
author = "Anonymous",
title = "Pages 99--211 ({June 1983})",
journal = j-COMPUT-SECUR,
volume = "2",
number = "2",
pages = "??--??",
month = jun,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1983:Eb,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "213--213",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900019",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:NMI,
author = "Anonymous",
title = "New members of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "214--217",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900020",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lobel:1983:SAC,
author = "Jerome Lobel",
title = "The state-of-the-art in computer security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "218--222",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900032",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1983:EISb,
author = "Charles Cresson Wood",
title = "Enhancing information security with the information
resource management approach",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "223--229",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900044",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1983:DSR,
author = "John M. Carroll",
title = "Decision support for risk analysis",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "230--236",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900056",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fry:1983:CME,
author = "Brian G. P. Fry and William F. Main",
title = "A conceptual methodology for evaluating security
requirements for data assets",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "237--241",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900068",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Koch:1983:IIT,
author = "Harvey S. Koch",
title = "Implementing an integrated test facility audit using
differential files",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "242--247",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390007X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hartson:1983:TPC,
author = "H. Rex Hartson",
title = "Teaching protection in computing: a research-oriented
graduate course",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "248--255",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900081",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Eloff:1983:SPS,
author = "Jan H. P. Eloff",
title = "Selection process for security packages",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "256--260",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900093",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ayoub:1983:DCE,
author = "F. Ayoub",
title = "The design of complete encryption networks using
cryptographically equivalent permutations",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "261--267",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390010X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sorkin:1983:RST,
author = "Arthur Sorkin",
title = "Requirements for a secure terminal switch",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "268--274",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900111",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bottom:1983:ITS,
author = "Norman R. Bottom",
title = "An informational theory of security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "275--280",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900123",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:NIT,
author = "Anonymous",
title = "News from {IFIP TC-11}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "281--282",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900135",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:POCb,
author = "Anonymous",
title = "Professional organizations in computer security",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "283--285",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900147",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:ARAc,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "286--296",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900159",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRSa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Security, IFIP\slash sec
'83}}: Viiveke F{\aa}k, Editor: Proceedings of the
first conference, Stockholm, Sweden, 16--19 May
1983. Amsterdam: North-Holland, 1983. xxxvi + 328
pp.\$39.00 (in United States and Canada). Dfl. 95.00
(rest of the world)}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "297--298",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900160",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRPa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Protecting your
microcomputer system}}: Harold Joseph Highland: New
York: John Wiley and Sons, Inc., 1984. xxii + 244
pp. \$14.95}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "298--298",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900172",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRN,
author = "Anonymous",
title = "Book Review: {{\booktitle{Nine steps to effective EDP
loss control}}: Tom S. Eason and Douglass A. Webb:
Bedford, MA: Digital Press, Digital Equipment Company,
1982. xi + 177 pp.}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "299--299",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900196",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRPb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Protecting information in
the electronic workplace: a guide for managers}}: James
A. Schweitzer: Reston VA: Reston Publishing Company,
Inc., 1983. xiv + 146 pp. \$19.95 (hardbound) and
\$14.95 (paperback)}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "299--299",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900184",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRC,
author = "Anonymous",
title = "Book Review: {{\booktitle{Computer security: an
overview of national concern and challenge}}: Louise G.
Becker: Washington DC: Library of Congress, 1983. xiv +
241 pp.}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "299--300",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900202",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:BRSb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Security manual}}: Eric
Oliver and John Wilson: [Fourth edition]. Brookfield
VT: Gower Publishing Co., 1983. xiv + 228
pp. \$12.50}",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "300--300",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900214",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "301--304",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900226",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:SIV,
author = "Anonymous",
title = "Subject index to volume 2",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "305--308",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404883900238",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:AIV,
author = "Anonymous",
title = "Author index to volume 2",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "309--309",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488390024X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1983:PN,
author = "Anonymous",
title = "Pages 213--309 ({November 1983})",
journal = j-COMPUT-SECUR,
volume = "2",
number = "3",
pages = "??--??",
month = nov,
year = "1983",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:E,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "1--2",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900191",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moulton:1984:DSM,
author = "Rolf Moulton",
title = "Data security is a management responsibility",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "3--7",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900208",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Koch:1984:ALS,
author = "Harvey S. Koch",
title = "Auditing on-line systems: an evaluation of parallel
versus Continuous and Intermittent Simulation",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "9--19",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490021X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schweitzer:1984:PWA,
author = "James A. Schweitzer",
title = "Personal workstation automation security
vulnerabilities",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "21--28",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900221",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seif:1984:CPB,
author = "Ruth A. Seif",
title = "Contingency planning in the banking community",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "29--34",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900233",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Oldehoeft:1984:SSU,
author = "Arthur E. Oldehoeft and Robert McDonald",
title = "A software scheme for user-controlled file
encryption",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "35--41",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900245",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Porter:1984:CNS,
author = "Sig Porter",
title = "Cryptology and number sequences: Pseudorandom, random,
and perfectly random",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "43--44",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900257",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mullin:1984:NMP,
author = "Albert A. Mullin",
title = "A note on the mathematics of public-key
cryptosystems",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "45--47",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900269",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ISa,
author = "Anonymous",
title = "{IFIP\slash Sec'84}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "49--50",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900270",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:TWC,
author = "Anonymous",
title = "{TC-11} Working Conference on Informatics Security
Management",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "50--52",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900282",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Comer:1984:CCN,
author = "Michael Comer",
title = "Computer crime needs international countermeasures",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "53--55",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900294",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRP,
author = "Anonymous",
title = "Book Review: {{\booktitle{The puzzle palace: a report
on NSA, America's most secret agency}}: James Bamford:
Boston: Houghton Mifflin Company, 1982, 465 pages.
\$16.95}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "57--57",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900300",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRDa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Data protection-data
security-privacy}}: Luxembourg: Terminology Bureau of
the Commission of the European Countries, 1981. 776
pages}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "57--58",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900312",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRAa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Advances in computer
security management. Volume 1}}: Thomas A. Rullo,
editor: New York, (Heyden) John Wiley and Sons, 1980.
245 + xi pages}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "58--58",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900324",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRAb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Advances in computer
security management. Volume 2}}: Marvin M. Wofsey,
editor: New York: John Wiley and Sons, 1983. 268 + xix
pages. \$39.95}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "58--59",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900336",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRI,
author = "Anonymous",
title = "Book Review: {{\booktitle{Information integrity: a
structure for its definition and management}}: Hal
B. Becker: New York: McGraw Hill Book Co., 1983. 237 +
xiii pages. \$26.95}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "59--60",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900348",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:BRDb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Dictionary of computers,
data processing and telecommunications}}: Jerry
M. Rosenberg: New York: John Wiley and Sons, 1984. 614
+ ix pages. \$29.95 hardcover, \$14.95 paperback}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "60--60",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490035X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "61--72",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900361",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "73--75",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900373",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490018X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:PF,
author = "Anonymous",
title = "Pages 1--75 ({February 1984})",
journal = j-COMPUT-SECUR,
volume = "3",
number = "1",
pages = "??--??",
month = feb,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1984:Ea,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "77--79",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900488",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:NMI,
author = "Anonymous",
title = "New members of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "80--80",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490049X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parker:1984:SSP,
author = "Donn B. Parker",
title = "Safeguards selection principles",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "81--91",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900506",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moulton:1984:PAS,
author = "Rolf T. Moulton",
title = "A practical approach to system security devices",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "93--99",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900518",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sorkin:1984:MCC,
author = "Arthur Sorkin and C. James Buchanan",
title = "Measurement of cryptographic capability protection
algorithms",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "101--116",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490052X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kaperonis:1984:IE,
author = "Ilias Kaperonis",
title = "Industrial espionage",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "117--121",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900531",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bump:1984:PSP,
author = "Morrison Bump",
title = "A primer on software piracy cases in the courts",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "123--134",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900543",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ICC,
author = "Anonymous",
title = "{International Carnahan Conference on Security
Technology}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "135--139",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900555",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ISJ,
author = "Anonymous",
title = "The {IPSA Silver Jubilee} conference",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "139--140",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900567",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1984:S,
author = "Charles Cresson Wood",
title = "Securicom '84",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "140--142",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900579",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ISb,
author = "Anonymous",
title = "{IFIP\slash Sec'84}",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "143--144",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900580",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:POC,
author = "Anonymous",
title = "Professional organizations in computer security",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "145--150",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900592",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "151--163",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900609",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "165--167",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900610",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:PM,
author = "Anonymous",
title = "Pages 77--167 ({May 1984})",
journal = j-COMPUT-SECUR,
volume = "3",
number = "2",
pages = "??--??",
month = may,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1984:Eb,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "169--170",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900385",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vandenBerg:1984:ATC,
author = "Bram van den Berg and Hans Leenaars",
title = "Advanced topics of a computer center audit",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "171--185",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900397",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barton:1984:UFP,
author = "Ben F. Barton and Marthalee S. Barton",
title = "User-friendly password methods for computer-mediated
information systems",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "186--195",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900403",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fugini:1984:ACM,
author = "M. Fugini and G. Martella",
title = "{ACTEN}: a conceptual model for security systems
design",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "196--214",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900415",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nestman:1984:TTS,
author = "Chadwick H. Nestman and John C. Windsor and Mary C.
Hinson",
title = "Tutorial on telecommunications and security",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "215--224",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900427",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Polis:1984:ISR,
author = "Richard I. Polis",
title = "Information security: Reality and fiction",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "225--228",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900439",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fisher:1984:CCS,
author = "Warren W. Fisher",
title = "Cryptography for computer security: Making the
decision",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "229--233",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900440",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Krause:1984:DEI,
author = "Lothar Krause",
title = "Data encryption in {ISO}, the International
Organization for Standardization",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "234--236",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900452",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:CLD,
author = "Anonymous",
title = "Computer law decisions and opinions",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "237--248",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900464",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "249--251",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900476",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:PA,
author = "Anonymous",
title = "Pages 169--251 ({August 1984})",
journal = j-COMPUT-SECUR,
volume = "3",
number = "3",
pages = "??--??",
month = aug,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:M,
author = "Anonymous",
title = "In Memoriam",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "253--255",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900014",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1984:Ec,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "257--257",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900026",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1984:CSE,
author = "Ronald Paans",
title = "Computer security and {EDP}-auditing: the twin
guards",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "259--261",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900038",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herschberg:1984:PTC,
author = "I. S. Herschberg and R. Paans",
title = "The programmer's threat: Cases and causes",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "263--272",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488490004X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Buurmeijer:1984:IDS,
author = "F. Buurmeijer",
title = "{IBM}'s data security strategy: Some implementation
aspects",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "273--277",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900051",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1984:TSM,
author = "R. Paans and I. S. Herschberg",
title = "A topology for secure {MVS} systems",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "278--285",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900063",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Louwerse:1984:DPA,
author = "C. P. Louwerse and J. M. L. Kouwenberg",
title = "Data protection aspects in an integrated hospital
information system",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "286--294",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900075",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanHoboken:1984:BV,
author = "W. R. C. van Hoboken",
title = "The burglar's viewpoint",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "295--302",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900087",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toppen:1984:ICA,
author = "R. Toppen",
title = "Infinite confidence: `The audit of data communication
networks'",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "303--313",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900099",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vandeGoor:1984:ETD,
author = "A. J. van de Goor",
title = "Effects of technical developments on system security",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "314--322",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900105",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1984:EEC,
author = "Ronald Paans",
title = "{ECOMA-12: European Computer Measurement Association
Conference}: Special interest group on performance
aspects of computer security",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "323--324",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900117",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:Cd,
author = "Anonymous",
title = "Crypto '84",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "324--325",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900129",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:SDD,
author = "Anonymous",
title = "Security in distributed data sharing systems",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "325--327",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900130",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:ARAc,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "328--341",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900142",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:Ce,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "342--345",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900154",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:SIV,
author = "Anonymous",
title = "Subject index to volume 3",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "346--349",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900166",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:AIV,
author = "Anonymous",
title = "Author index to volume 3",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "350--351",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404884900178",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1984:PN,
author = "Anonymous",
title = "Pages 253--351 ({November 1984})",
journal = j-COMPUT-SECUR,
volume = "3",
number = "4",
pages = "??--??",
month = nov,
year = "1984",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:Ea,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "1--2",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900021",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:NMIa,
author = "Anonymous",
title = "New member of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "3--3",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900033",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1985:CFA,
author = "John M. Carroll and W. R. Mac Iver",
title = "{COSSAC}: a framework for analyzing and configuring
secure computer facilities",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "5--12",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900045",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schweitzer:1985:MVC,
author = "James A. Schweitzer",
title = "A management view: computer security as a
discretionary decision",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "13--22",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900057",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gal:1985:SIA,
author = "Graham Gal and William E. McCarthy",
title = "Specification of internal accounting controls in a
database environment",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "23--32",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900069",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cerullo:1985:GCC,
author = "Michael J. Cerullo",
title = "General controls in computer systems",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "33--45",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900070",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Serpell:1985:CES,
author = "Stephen C. Serpell",
title = "Cryptographic equipment security: a code of practice",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "47--64",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900082",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:FNC,
author = "Harold Joseph Highland",
title = "The first national computer security conference",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "65--73",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900094",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:DSC,
author = "Anonymous",
title = "Data security and confidentiality",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "75--81",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900100",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "83--95",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900112",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "97--99",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900124",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "ifc--ifc",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488590001X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:PM,
author = "Anonymous",
title = "Pages 1--100 ({March 1985})",
journal = j-COMPUT-SECUR,
volume = "4",
number = "1",
pages = "??--??",
month = mar,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:Eb,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "101--102",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900136",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Auerbach:1985:PRI,
author = "Isaac L. Auerbach",
title = "Professional responsibility for information privacy",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "103--107",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900148",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yeo:1985:IAC,
author = "Gee Kin Yeo",
title = "Incorporating access control in forms systems",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "109--122",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488590015X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:MSD,
author = "Harold Joseph Highland",
title = "Microcomputer security: Data protection techniques",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "123--134",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900161",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1985:EAR,
author = "Belden Menkus",
title = "The {EDP} auditor's role in computer security",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "135--138",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900173",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miller:1985:TCS,
author = "James E. Miller",
title = "Transaction controls: Steps to take after the
equipment has been secured",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "139--141",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900185",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Eloff:1985:DSL,
author = "Jan H. P. Eloff",
title = "The development of a specification language for a
computer security system",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "143--147",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900197",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoving:1985:MFM,
author = "Per L. Hoving and Johan Ess{\'e}n",
title = "Minutes from the first meeting of {TC} 11, security
and protection in information processing systems",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "149--152",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900203",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:ITC,
author = "Anonymous",
title = "{IFIP} technical committee 11 members",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "153--159",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900215",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:SIC,
author = "Anonymous",
title = "Second international congress on computer security",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "161--171",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900227",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:POC,
author = "Anonymous",
title = "Professional organizations in computer security",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "173--174",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900239",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "175--181",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900240",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "183--184",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900252",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:PJ,
author = "Anonymous",
title = "Pages 101--184 ({June 1985})",
journal = j-COMPUT-SECUR,
volume = "4",
number = "2",
pages = "??--??",
month = jun,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:EOA,
author = "Harold Joseph Highland",
title = "Editorial: {Office} automation {\em or} on the value
of being a dinosaur",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "185--186",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900264",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:NMIb,
author = "Anonymous",
title = "New members of the international board of editors",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "187--187",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900276",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1985:SCN,
author = "Fred Cohen",
title = "A secure computer network design",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "189--205",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900288",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chamoux:1985:DSC,
author = "J. P. Chamoux",
title = "Data security and confidentiality in {Europe}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "207--210",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488590029X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pieprzyk:1985:MDI,
author = "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
title = "Modular design of information encipherment for
computer systems",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "211--218",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900306",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1985:IBS,
author = "Belden Menkus",
title = "The impact of the {Bell} system breakup on {DP}
disaster recovery planning",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "219--222",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900318",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1985:FDS,
author = "Charles Cresson Wood",
title = "Floppy diskette security measures",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "223--228",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488590032X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:DNC,
author = "Anonymous",
title = "7th {DoD\slash NBS} computer security conference",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "229--237",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900331",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:S,
author = "Anonymous",
title = "Securicom '85",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "238--242",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900343",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:N,
author = "Anonymous",
title = "Networks '84",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "242--243",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900355",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{HJH:1985:UCC,
author = "HJH",
title = "{U.S.} computer crime legislation highlighted in
special report",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "245--246",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900367",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{HJH:1985:BRK,
author = "HJH",
title = "Book Review: {{\booktitle{Kahn on codes: Secrets of
the new cryptology}}: David Kahn New York: Macmillan
Publishing Company, 1984. 344 + viii pages, \$19.95}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "247--247",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900379",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{HJH:1985:BRM,
author = "HJH",
title = "Book Review: {{\booktitle{Managing risk: a
computer-aided strategy}}: John M. Carroll Boston:
Butterworths, 1984. 277 + xvi pages, \$18.95}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "247--248",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900380",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1985:BRS,
author = "Charles Cresson Wood",
title = "Book Review: {{\booktitle{Security for computer
networks}}: D. W. Davies and W. L. Price New York: John
Wiley and Sons, 1984. 386 + xix pages, \$19.50}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "248--249",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900392",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{EHH:1985:BRT,
author = "EHH",
title = "Book Review: {{\booktitle{Transborder data flows:
access to the international on-line data-base market}}:
Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl
75.00\slash {US} \$28.75}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "249--249",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900410",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{HJH:1985:BRC,
author = "HJH",
title = "Book Review: {{\booktitle{Communication regulation and
international business}}: Juan F. Rada and G. Russell
Pipe, editors Amsterdam: North-Holland, 1984. 266 + x
pages, Dfl. 120.00\slash US \$46.25}",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "249--249",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900409",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{EHH:1985:PSC,
author = "EHH",
title = "Proceedings of the seventh computer security group
conference: {Washington: US Government Printing
Office}, 1984 --- 776-101\slash 1027. 115 pages",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "249--250",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900422",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:ARAc,
author = "Anonymous",
title = "Abstract of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "251--263",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900434",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "265--266",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900446",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:PS,
author = "Anonymous",
title = "Pages 185--266 ({September 1985})",
journal = j-COMPUT-SECUR,
volume = "4",
number = "3",
pages = "??--??",
month = sep,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1985:Ec,
author = "Harold Joseph Highland",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "267--268",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900458",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanEck:1985:ERV,
author = "Wim van Eck",
title = "Electromagnetic radiation from video display units: an
eavesdropping risk?",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "269--286",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488590046X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wong:1985:CCR,
author = "Ken Wong",
title = "Computer crime --- Risk management and computer
security",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "287--295",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900471",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pieprzyk:1985:DPK,
author = "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
title = "Design of public key cryptosystems using idempotent
elements",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "297--308",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900483",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{deBruyne:1985:SVU,
author = "P. de Bruyne",
title = "Signature verification using holistic measures",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "309--315",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900495",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{duCroix:1985:DSA,
author = "A. J. du Croix",
title = "Data sharing and access protection in business system
12",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "317--323",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900501",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Voydock:1985:SMT,
author = "Victor L. Voydock and Stephen T. Kent",
title = "Security mechanisms in a transport layer protocol",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "325--341",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900513",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:SS,
author = "Anonymous",
title = "Systems Security",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "343--347",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900525",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:ARAd,
author = "Anonymous",
title = "Abstracts of Recent Articles and Literature",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "349--362",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900537",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:Cd,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "363--364",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900549",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:SIV,
author = "Anonymous",
title = "Subject index to volume 4",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "365--366",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900550",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:AIV,
author = "Anonymous",
title = "Author index to volume 4",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "367--367",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404885900562",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1985:PD,
author = "Anonymous",
title = "Pages 267--367 ({December 1985})",
journal = j-COMPUT-SECUR,
volume = "4",
number = "4",
pages = "??--??",
month = dec,
year = "1985",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ILa,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "1--1",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901021",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:NMI,
author = "Anonymous",
title = "New member of the international board of editors",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "2--2",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901033",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:NPR,
author = "Anonymous",
title = "News from the Peoples {Republic} of {China}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "3--3",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901045",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:D,
author = "Anonymous",
title = "The demise of the {DES}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "3--4",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901057",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:TWa,
author = "Anonymous",
title = "Technology watch",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "4--6",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901069",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:IS,
author = "Anonymous",
title = "{IFIP\slash Sec} '86",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "6--7",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901070",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PSM,
author = "Anonymous",
title = "Physical security of microcomputers and terminals",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "7--8",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901082",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:MMC,
author = "Anonymous",
title = "Microcomputer-mainframe communications link",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "8--8",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901094",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:DOD,
author = "Anonymous",
title = "Don't overlook data compression",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "8--9",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901100",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:WFF,
author = "Anonymous",
title = "Wanted: Floods, fires, disasters, etc.",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "10--10",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901112",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1986:WDW,
author = "Bernard P. Zajac",
title = "What to do when you have reason to believe your
computer has been compromised",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "11--16",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901124",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kinnon:1986:ASI,
author = "A. Kinnon and R. H. Davis",
title = "Audit and security implications of electronic funds
transfer",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "17--23",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901136",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goeltz:1986:W,
author = "Ted Goeltz",
title = "Why not {DES}?",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "24--27",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901148",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Harper:1986:ICL,
author = "Robert M. Harper",
title = "Internal control in local area networks: an
accountant's perspective",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "28--35",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690115X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vandenAssem:1986:CPA,
author = "R. van den Assem and W. J. van Elk",
title = "A chosen-plaintext attack on the {Microsoft BASIC}
protection",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "36--45",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901161",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1986:HCM,
author = "R. Paans and I. S. Herschberg",
title = "How to control {MVS} user supervisor calls",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "46--54",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901173",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "55--67",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901185",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Owen:1986:CSI,
author = "Kenneth Owen",
title = "Computer security: {IFIP} addresses the practical
issues",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "68--72",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901197",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:TSR,
author = "Anonymous",
title = "{TC} 11 status report",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "72--73",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901203",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoving:1986:SST,
author = "Per Hoving",
title = "System security: the technical challenge",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "74--79",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901215",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "80--82",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901227",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "ifc--ifc",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690101X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PM,
author = "Anonymous",
title = "Pages 1--82 ({March 1986})",
journal = j-COMPUT-SECUR,
volume = "5",
number = "1",
pages = "??--??",
month = mar,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ILb,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "83--83",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901239",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Essen:1986:NMI,
author = "Johan Essen",
title = "New member of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "84--84",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901240",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ERRa,
author = "Harold Joseph Highland",
title = "Electromagnetic radiation revisited",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "85--93",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901252",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:BDT,
author = "Anonymous",
title = "{``Back door''} trespassing",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "94--94",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901264",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:TWb,
author = "Anonymous",
title = "Technology watch",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "94--97",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901276",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:SSR,
author = "Anonymous",
title = "Some suggested reading",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "97--97",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901288",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:SR,
author = "Anonymous",
title = "Security reminders",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "97--98",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690129X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:CPC,
author = "Anonymous",
title = "On cryptographic protection of capabilities",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "98--99",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901306",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:SN,
author = "Anonymous",
title = "On a serious (?) note",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "99--99",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901318",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ware:1986:EPIa,
author = "Willis H. Ware",
title = "Emerging privacy issues",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "101--113",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690132X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1986:SMP,
author = "Charles Cresson Wood and Howard M. Zeidler",
title = "Security modules: Potent information security system
components",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "114--121",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901331",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoebeke:1986:CSP,
author = "L. Hoebeke",
title = "Computer security --- Prevention: Lessons from the
operation of a nuclear power plant",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "122--127",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901343",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanderLans:1986:DSR,
author = "R. F. van der Lans",
title = "Data security in a relational database environment",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "128--134",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901355",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Richards:1986:RMK,
author = "Roy Martin Richards and Jan Yestingsmeier",
title = "Risk management --- a key to security in the
electronic funds transfer system",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "135--140",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901367",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bishop:1986:PCS,
author = "Matt Bishop",
title = "A pauper's callback scheme",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "141--144",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901379",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jansen:1986:KSR,
author = "C. J. A. Jansen",
title = "On the key storage requirements for secure terminals",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "145--149",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901380",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "150--164",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901392",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:WSR,
author = "Anonymous",
title = "{WG} 11:4 status report",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "165--166",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901409",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1986:DSR,
author = "John M. Carroll and Helmut J{\"u}rgensen",
title = "Design of a secure relational data base",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--167",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901422",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faak:1986:SVH,
author = "Viiveke F{\aa}k",
title = "Software versus hardware encryption --- Is there any
difference today?",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--167",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901434",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Power:1986:AHE,
author = "June M. Power and Steve R. Wilbur",
title = "Authentication in a heterogeneous environment",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--167",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901458",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tompkins:1986:ISAa,
author = "Frederick G. Tompkins and Russel Rice",
title = "Intergrating security activities into the software
development life cycle and the software quality
assurance process",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--167",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901446",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ware:1986:EPIb,
author = "Willis H. Ware",
title = "Emerging privacy issues",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--167",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901410",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Worthington:1986:IDS,
author = "T. K. Worthington and J. J. Chainer and J. D. Willford
and S. C. Gunderson",
title = "{IBM} dynamic signature verification",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "167--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690146X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beatson:1986:DOA,
author = "John G. Beatson",
title = "Development and organization of the audit and security
functions",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901495",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Doswell:1986:ACS,
author = "Roger T. Doswell",
title = "The audit, control and security of the project life
cycle --- Pre-implementation stage",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901513",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ekerbrink:1986:SET,
author = "Ivan Ekerbrink",
title = "Security of electronic transactions",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901483",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kingston:1986:SSB,
author = "Peter P. C. H. Kingston and Martin Goulbourn",
title = "Security for small business computers",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901525",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kugler:1986:CPI,
author = "Han-J{\"u}rgen Kugler",
title = "Concepts of protection in the {IFIP WG 2.7} reference
model for command and response languages",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901471",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tener:1986:DSS,
author = "William T. Tener",
title = "Decision support systems --- a necessity for effective
auditing of controls",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--168",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901501",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stanley:1986:ECC,
author = "Philip M. Stanley",
title = "Educating computer crime investigators",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "168--169",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901537",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Davies:1986:HUS,
author = "Donald W. Davies",
title = "How to use the {DES} safely",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "169--169",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901562",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murine:1986:PRS,
author = "Gerald E. Murine",
title = "Producing reliable, secure software",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "169--169",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901549",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1986:ETS,
author = "Charles Cresson Wood",
title = "Establishing technical systems security standards at a
large multinational bank",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "169--169",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901550",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:Cb,
author = "Anonymous",
title = "{CRYPTO} '85",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "170--176",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901574",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "177--178",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886901586",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PJ,
author = "Anonymous",
title = "Pages 83--178 ({June 1986})",
journal = j-COMPUT-SECUR,
volume = "5",
number = "2",
pages = "??--??",
month = jun,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ILc,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "179--180",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900015",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ERRb,
author = "Harold Joseph Highland and Viiveke F{\aa}k",
title = "Electromagnetic radiation revisited, part {II}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "181--184",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900027",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:MTT,
author = "Anonymous",
title = "Modern technology tools for user authentication",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "184--185",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900039",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:MAC,
author = "Anonymous",
title = "Microcomputer access control limited by password,
time, day, and\slash or program",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "185--186",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:BL,
author = "Anonymous",
title = "In brief \ldots{}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "187--188",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:MAT,
author = "Anonymous",
title = "Microcomputer audit trails made easy",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "188--189",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:RAP,
author = "Anonymous",
title = "Risk analysis package",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "189--190",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:CBa,
author = "Anonymous",
title = "Coffee break",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "190--190",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900088",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:HDD,
author = "Anonymous",
title = "Hard disk disaster recovery tool",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "190--192",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690009X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1986:EIT,
author = "Charles Cresson Wood",
title = "Establishing internal technical systems security
standards",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "193--200",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beatson:1986:MEA,
author = "John G. Beatson",
title = "Managing the {EDP} audit and security functions",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "201--206",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900118",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Richards:1986:ICR,
author = "Roy Martin Richards",
title = "Insuring computer risks",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "207--210",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690012X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoffman:1986:SVC,
author = "Lance J. Hoffman and Lucy M. Moran",
title = "Societal vulnerability to computer system failures",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "211--217",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tompkins:1986:ISAb,
author = "Frederick G. Tompkins and Russell S. Rice",
title = "Integrating security activities into the software
development life cycle and the software quality
assurance process",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "218--242",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pluimakers:1986:ACS,
author = "G. M. J. Pluimakers and J. van Leeuwen",
title = "Authentication: a concise survey",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "243--250",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900155",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lapid:1986:AHT,
author = "Yeheskel Lapid and Niv Ahituv and Seev Neumann",
title = "Approaches to handling {``Trojan Horse''} threats",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "251--256",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900167",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:ARAc,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "257--272",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900179",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:Cd,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "273--275",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900180",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PS,
author = "Anonymous",
title = "Pages 179--275 ({September 1986})",
journal = j-COMPUT-SECUR,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:ILd,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "277--278",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900416",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:AVA,
author = "Anonymous",
title = "Another view about passwords",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "279--281",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900428",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:R,
author = "Anonymous",
title = "The {DES} revisited",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "281--282",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690043X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:RRP,
author = "Anonymous",
title = "{RAM}-resident program security threat",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "282--285",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:AMS,
author = "Anonymous",
title = "Advanced microcomputer security system",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "285--287",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900453",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:III,
author = "Anonymous",
title = "{International Information Integrity Institute}",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "287--287",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900465",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:LLN,
author = "Anonymous",
title = "The lure of large numbers",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "287--287",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900477",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:RE,
author = "Anonymous",
title = "Remember the {Enigma}!",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "288--289",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900489",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tener:1986:DCD,
author = "William T. Tener",
title = "Detection of control deterioration using decision
support systems",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "290--295",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900490",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rutledge:1986:SIC,
author = "Linda S. Rutledge and Lance J. Hoffman",
title = "A survey of issues in computer network security",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "296--308",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stanley:1986:CCI,
author = "Philip M. Stanley",
title = "Computer crime investigation and investigators",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "309--313",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karger:1986:ADA,
author = "Paul A. Karger",
title = "Authentication and discretionary access control in
computer networks",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "314--324",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900520",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ekebrink:1986:DST,
author = "Ivan Ekebrink",
title = "Data security in terminalized system",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "325--327",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900532",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alagar:1986:HAT,
author = "V. S. Alagar",
title = "A human approach to the technological challenges in
data security",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "328--335",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900544",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murine:1986:SSI,
author = "Gerald E. Murine",
title = "Secure software's impact on reliability",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "336--339",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900556",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1986:HMM,
author = "Harold Joseph Highland",
title = "How to modify a microcomputer operating system for
added security",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "340--343",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900568",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Erdem:1986:HCO,
author = "Hilmi Erdem",
title = "Host cryptographic operations: a software
implementation",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "344--346",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690057X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leahy:1986:PP,
author = "Patrick Leahy",
title = "Privacy and progress",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "347--349",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900581",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:ARAd,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "350--359",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900593",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PIE,
author = "Anonymous",
title = "Protection of information in electronic systems",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "360--360",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488690060X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:ERS,
author = "Anonymous",
title = "Electronic record systems and individual privacy",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "361--362",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900611",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:Ce,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "363--364",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900623",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:SIV,
author = "Anonymous",
title = "Subject index to volume 5",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "365--366",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900635",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:AIV,
author = "Anonymous",
title = "Author index to volume 5",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "367--368",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404886900647",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1986:PD,
author = "Anonymous",
title = "Pages 277--368 ({December 1986})",
journal = j-COMPUT-SECUR,
volume = "5",
number = "4",
pages = "??--??",
month = dec,
year = "1986",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:ILa,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "1--3",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901118",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:NMI,
author = "Anonymous",
title = "New members of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "4--7",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790112X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CVS,
author = "Harold Joseph Highland",
title = "Computer viruses and sudden death!",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "8--10",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:TWP,
author = "Anonymous",
title = "Technology watch --- Personal authentication devices",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "10--11",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:IS,
author = "Anonymous",
title = "{IFIP\slash Sec}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "12--12",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901155",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:EEF,
author = "Anonymous",
title = "Electromagnetic eavesdropping --- Fact of fantasy?",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "12--14",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901167",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:OMN,
author = "Anonymous",
title = "Other meetings of note",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "14--14",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901180",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:RAT,
author = "Anonymous",
title = "Report about {TC} 11 working groups",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "14--14",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901179",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SR,
author = "Anonymous",
title = "Security reminder",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "15--15",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:P,
author = "Anonymous",
title = "{DOS} postscript",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "15--16",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moulton:1987:HSC,
author = "Rolf T. Moulton",
title = "How to supervise and control {I/S} Security Officers
and Auditors",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "17--21",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901210",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1987:CVT,
author = "Fred Cohen",
title = "Computer viruses: Theory and experiments",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "22--35",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901222",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faak:1987:CMM,
author = "Viiveke F{\aa}k",
title = "Crypto management made manageable --- Demands on
crypto equipment design",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "36--40",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901234",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Power:1987:AHE,
author = "June M. Power and Steve R. Wilbur",
title = "Authentication in a heterogeneous environment",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "41--48",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Solarz:1987:CRE,
author = "Artur Solarz",
title = "Computer-related embezzlement",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "49--53",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901258",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Longley:1987:ESA,
author = "Dennis Longley",
title = "Expert systems applied to the analysis of key
management schemes",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "54--67",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790126X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kingston:1987:SMU,
author = "Peter P. C. H. Kingston and Martin Goulbourn",
title = "Security for microcomputers used in small business",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "68--72",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:DPV,
author = "Harold Joseph Highland",
title = "Data physician --- a virus protection program",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "73--79",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901283",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "80--90",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901295",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SS,
author = "Anonymous",
title = "System Security 1986",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "91--93",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901301",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SEC,
author = "Anonymous",
title = "Second {European} Conference on Computer Audit,
Control and Security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "94--94",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "95--96",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901325",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PF,
author = "Anonymous",
title = "Pages 1--96 ({February 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "1",
pages = "??--??",
month = feb,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:ILb,
author = "Harold Joseph Highland",
title = "In this issue \ldots{}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "97--98",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900745",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:HSY,
author = "Harold Joseph Highland",
title = "How secure are your encryption keys?",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "99--100",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900757",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:RPI,
author = "Harold Joseph Highland",
title = "The {DES} revisited --- Part {II}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "100--101",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900769",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CSN,
author = "Harold Joseph Highland",
title = "Computer security: a new focus at the {National Bureau
of Standards}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "102--103",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900770",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:TW,
author = "Harold Joseph Highland",
title = "Technology watch",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "103--108",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900782",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CCS,
author = "Harold Joseph Highland",
title = "The charade of computer security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "108--109",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:RNR,
author = "Harold Joseph Highland",
title = "Random notes and reports",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "109--110",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900800",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Saari:1987:CCN,
author = "Juhani Saari",
title = "Computer crime --- numbers lie",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "111--117",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900812",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohe:1987:PAI,
author = "Fred Cohe",
title = "Protection and administration of information networks
with partial orderings",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "118--128",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900824",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schweitzer:1987:HSF,
author = "James A. Schweitzer",
title = "How security fits in --- a management view: Security
is an essential for quality information",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "129--132",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900836",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herschberg:1987:HC,
author = "I. S. Herschberg",
title = "The hackers' comfort",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "133--138",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bui:1987:CEM,
author = "Tung Bui and Taracad R. Sivasankaran",
title = "Cost-effectiveness modeling for a decision support
system in computer security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "139--151",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790085X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahituv:1987:VAI,
author = "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
title = "Verifying the authentication of an information system
user",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "152--157",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900861",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pfitzmann:1987:NUO,
author = "Andreas Pfitzmann and Michael Waidner",
title = "Networks without user observability",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "158--166",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1987:ISI,
author = "Ronald Paans",
title = "{IFIP\slash Sec'86}: Information security: the
challenge",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "167--171",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900885",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1987:E,
author = "Ronald Paans",
title = "{ECOMA-14}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "172--172",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900897",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1987:FEC,
author = "Ronald Paans",
title = "First {European} Conference on Computer Audit, Control
and Security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "173--176",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:1987:PAC,
author = "J. A. N. Lee and Gerald Segal",
title = "Positive alternatives to computer misuse: a report of
the proceedings of an {ACM} panel on hacking",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "177--179",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900915",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "180--190",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900927",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "191--192",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900939",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PAa,
author = "Anonymous",
title = "Pages 97--192 ({April 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "??--??",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:Ea,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "193--194",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900940",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:DES,
author = "Harold Joseph Highland",
title = "Data encryption standard {II}?",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "195--196",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900952",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:RB,
author = "Harold Joseph Highland",
title = "Report from {Beijing}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "196--198",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900964",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:IS,
author = "Harold Joseph Highland",
title = "Information sources",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "198--199",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900976",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:EP,
author = "Harold Joseph Highland",
title = "Encryption package",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "199--202",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900988",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:UDC,
author = "Harold Joseph Highland",
title = "{US} data controls",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "202--203",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790099X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CSL,
author = "Harold Joseph Highland",
title = "Computer security and law",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "203--205",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901003",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CC,
author = "Harold Joseph Highland",
title = "Cipher cracking",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "205--205",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901015",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rihaczek:1987:TOC,
author = "Karl Rihaczek",
title = "{TeleTrusT}-{OSIS} and communication security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "206--218",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901027",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1987:DAD,
author = "Fred Cohen",
title = "Design and administration of distributed and
hierarchical information networks under partial
orderings",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "219--228",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901039",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:HEM,
author = "Harold Joseph Highland",
title = "How to evaluate microcomputer encryption software and
hardware",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "229--244",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dwyer:1987:MLS,
author = "Patricia A. Dwyer and George D. Jelatis and Bhavani M.
Thuraisingham",
title = "Multi-level security in database management systems",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "245--251",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Johnstone:1987:KUF,
author = "Richard J. Johnstone",
title = "Key updating flags in {EFT}-{POS} security systems",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "252--260",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanHeurck:1987:TBS,
author = "Ph. van Heurck",
title = "{TRASEC}: {Belgian} security system for electronic
funds transfers",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "261--268",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAc,
author = "Anonymous",
title = "Abstracts of recent articles and literature: Computer
law",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "269--281",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887901088",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "282--283",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790109X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PJ,
author = "Anonymous",
title = "Pages 193--283 ({June 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "3",
pages = "??--??",
month = jun,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:EL,
author = "Harold Joseph Highland",
title = "From the editor \ldots{}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "285--287",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900605",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:WYR,
author = "Harold Joseph Highland",
title = "Would you report a suspected data crime to the
authorities?",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "288--295",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900617",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:TWA,
author = "Anonymous",
title = "Technology watch --- access control to mainframe",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "295--296",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900629",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:RA,
author = "Anonymous",
title = "Risk assessment",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "297--298",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900630",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:VLR,
author = "Anonymous",
title = "Very light reading",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "298--299",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900642",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1987:SEU,
author = "John M. Carroll",
title = "Strategies for extending the useful lifetime of
{DES}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "300--313",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900654",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1987:ISS,
author = "Charles Cresson Wood",
title = "Information systems security: Management success
factors",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "314--320",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pozzo:1987:ACC,
author = "Maria M. Pozzo and Terence E. Gray",
title = "An approach to containing computer viruses",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "321--331",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900678",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1987:DPI,
author = "Fred Cohen",
title = "Design and protection of an information network under
a partial ordering: a case study",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "332--338",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790068X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitchell:1987:CRK,
author = "Chris Mitchell and Fred Piper",
title = "The cost of reducing key-storage requirements in
secure networks",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "339--341",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900691",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:1987:IRC,
author = "Achim Jung",
title = "Implementing the {RSA} cryptosystem",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "342--350",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900708",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faak:1987:RWC,
author = "Viiveke F{\aa}k",
title = "Report from the working conference on ``the {Crypto
User's Handbook}'' held in {Stockholm, October 22--23,
1986 by IFIP WG 11:4}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "351--351",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790071X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAd,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "352--362",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900721",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Cd,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "363--364",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900733",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PAb,
author = "Anonymous",
title = "Pages 285--364 ({August 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "??--??",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:Eb,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "365--367",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900010",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:SFT,
author = "Harold Joseph Highland",
title = "Secure fax transmission",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "368--370",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:HSE,
author = "Anonymous",
title = "High-speed encrypted storage\slash backup",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "370--373",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900034",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:MAU,
author = "Anonymous",
title = "Message authentication using the {RSA}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "373--376",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900046",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SRP,
author = "Anonymous",
title = "Secure remote power-on modem",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "376--378",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900058",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:WIS,
author = "Anonymous",
title = "Write it down safely",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "379--379",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790006X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SSC,
author = "Anonymous",
title = "Speedier secure communications",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "379--380",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:LI,
author = "Anonymous",
title = "Lock it up",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "380--381",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900083",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:RN,
author = "Anonymous",
title = "Random notes",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "381--382",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900095",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:GC,
author = "Anonymous",
title = "Guest comments",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "382--384",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900101",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spender:1987:ICU,
author = "J-C. Spender",
title = "Identifying computer users with authentication devices
(tokens)",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "385--395",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fernandez:1987:ACA,
author = "C. Fern{\'a}ndez and A. Vaquero and J. M. Troya and J.
M. S{\'a}nchez",
title = "Automating the computation of authenticators for
interbank telex messages",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "396--402",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900125",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1987:CSL,
author = "R. Paans and I. S. Herschberg",
title = "Computer security: the long road ahead",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "403--416",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900137",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Post:1987:IOS,
author = "Gerald V. Post",
title = "Improving operating system security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "417--425",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900149",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:NCC,
author = "Anonymous",
title = "{NTIS} computers, control and information theory",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "426--431",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900150",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAe,
author = "Anonymous",
title = "Abstracts of recent articles and literature: Computer
law",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "432--441",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900162",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Ce,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "442--443",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900174",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PO,
author = "Anonymous",
title = "Pages 365--443 ({October 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "5",
pages = "??--??",
month = oct,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:Ec,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "445--446",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900186",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:NMI,
author = "Harold Joseph Highland",
title = "New member of the International Board of {Editors}",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "447--447",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900198",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:CAM,
author = "Harold Joseph Highland",
title = "Computer abuse and managerial response",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "448--448",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900204",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:DCS,
author = "Harold Joseph Highland",
title = "Data cartridge for secure data",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "449--451",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900216",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:PR,
author = "Harold Joseph Highland",
title = "Passwords revisited",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "451--452",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900228",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:OAS,
author = "Harold Joseph Highland",
title = "{Office} automation security",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "452--457",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488790023X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:TLC,
author = "Harold Joseph Highland",
title = "Tempest over leaking computers",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "457--458",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900241",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:HDR,
author = "Harold Joseph Highland",
title = "Hard disk recovery tools",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "458--462",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900253",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1987:RN,
author = "Harold Joseph Highland",
title = "Random notes",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "463--463",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900265",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Smith:1987:AUW,
author = "Sidney L. Smith",
title = "Authenticating users by word association",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "464--470",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900277",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baird:1987:MC,
author = "Bruce J. Baird and Lindsay L. Baird and Ronald P.
Ranauro",
title = "The moral cracker?",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "471--478",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900289",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thuraisingham:1987:SCR,
author = "M. B. Thuraisingham",
title = "Security checking in relational database management
systems augmented with inference engines",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "479--492",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900290",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guarro:1987:PPL,
author = "Sergio B. Guarro",
title = "Principles and procedures of the {LRAM} approach to
information systems risk analysis and management",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "493--504",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900307",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1987:CCI,
author = "Fred Cohen",
title = "A cryptographic checksum for integrity protection",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "505--510",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900319",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1987:HIS,
author = "Charles Cresson Wood",
title = "The human immune system as an information systems
security reference model",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "511--516",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900320",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:ARAf,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "517--526",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900332",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:Cf,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "527--527",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:SIV,
author = "Anonymous",
title = "Subject index to volume 6",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "528--529",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900356",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:AIV,
author = "Anonymous",
title = "Author index to volume 6",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "530--531",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404887900368",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1987:PD,
author = "Anonymous",
title = "Pages 445--531 ({December 1987})",
journal = j-COMPUT-SECUR,
volume = "6",
number = "6",
pages = "??--??",
month = dec,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:E,
author = "Anonymous",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "2--2",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904877",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "2--2",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904865",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CHV,
author = "Harold Joseph Highland",
title = "Case history of a virus attack",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "3--5",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904889",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:EAE,
author = "Harold Joseph Highland",
title = "Encryption, attacks and ethics",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "5--6",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904890",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HPMa,
author = "Harold Joseph Highland",
title = "How to protect a microcomputer system",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "6--7",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904907",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CCC,
author = "Harold Joseph Highland",
title = "{Chernobyl} computer communications",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "7--9",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904919",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:EI,
author = "Harold Joseph Highland",
title = "Electromagnetic interference",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "9--10",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904920",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:IS,
author = "Harold Joseph Highland",
title = "{IFIP\slash Sec '88}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "10--10",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904932",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:YI,
author = "Harold Joseph Highland",
title = "For your information",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "10--11",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904944",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PR,
author = "Harold Joseph Highland",
title = "Product reviews",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "13--18",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904956",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Courtney:1988:APS,
author = "Robert H. Courtney",
title = "Another perspective on sensitive but unclassified
data",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "19--23",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904968",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HSF,
author = "Harold Joseph Highland",
title = "How secure are fiber optics communications?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "25--26",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890497X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SIT,
author = "Harold Joseph Highland",
title = "Secretdisk {II} --- transparent automatic encryption",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "27--34",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904981",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1988:DCL,
author = "Bernard P. Zajac",
title = "Dial-up communication lines: Can they be secured?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "35--36",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888904993",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PAO,
author = "Harold Joseph Highland",
title = "Program aids for office automation security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "37--43",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905007",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRa,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "45--46",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905019",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1988:GSD,
author = "Belden Menkus",
title = "Getting started in data processing disaster recovery",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "47--52",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905020",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Amsel:1988:NSA,
author = "Ellen Amsel",
title = "Network security and access controls",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "53--57",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905032",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahituv:1988:PSD,
author = "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
title = "Protecting statistical databases against retrieval of
private information",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "59--63",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905044",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Christoffersson:1988:MAE,
author = "Per Christoffersson",
title = "Message authentication and encryption combined",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "65--71",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905056",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lunt:1988:ELC,
author = "Teresa F. Lunt and Dorothy E. Denning and Roger R.
Schell and Mark Heckman and William R. Shockley",
title = "Element-level classification with A1 assurance",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "73--82",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905068",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Salomaa:1988:PKC,
author = "Arto Salomaa",
title = "A public-key cryptosystem based on language theory",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "83--87",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890507X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NLK,
author = "Anonymous",
title = "New locks and keys for electronic information",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "89--93",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905081",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCa,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "95--96",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905093",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WWRa,
author = "Anonymous",
title = "World-wide reports on developments in computer
security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "97--100",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890510X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ADD,
author = "Anonymous",
title = "Anatomy of a disaster: {David Davies}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "101--101",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905159",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:AUS,
author = "Anonymous",
title = "{Apple} urges separate copyright registration of
screen displays: {Scott} Mace",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "101--101",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905111",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:FSP,
author = "Anonymous",
title = "Fighting software piracy",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "101--101",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905135",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:GSP,
author = "Anonymous",
title = "Guidelines or standards! {Part} one: {Yvo
Henniker-Heaton}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "101--101",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905147",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:JOP,
author = "Anonymous",
title = "{Justice} ordered to pay software licensing fees: {Tim
McGraw}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "101--101",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905123",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:BRCa,
author = "Anonymous",
title = "Book Review: {{\booktitle{Computer crime --- What to
do before it happens}}: Bernard P. Zajac, Jr.}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905160",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:GCH,
author = "Anonymous",
title = "{German} computer hobbyists rifle {NASA}'s files:
{Serge Schmemann}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905214",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:GUD,
author = "Anonymous",
title = "1-2-3 to go unprotected: {Douglas Barney}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905172",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HRU,
author = "Anonymous",
title = "{HK} raid uncovers {Autodesk} pirates",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905202",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LPN,
author = "Anonymous",
title = "{Lotus} promises new releases, no protection:
{Virginia} Dudek",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905184",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MCS,
author = "Anonymous",
title = "{MIS} computer security slacking: {June Altman}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--102",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905196",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NSC,
author = "Anonymous",
title = "{NASA} says classified data not breached: {Rick
Vizachero}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "102--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905226",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PED,
author = "Anonymous",
title = "Processing encrypted data: {Niv Ahituv, Yeheskel
Lapid, and Seev Neumann}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890524X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PPI,
author = "Anonymous",
title = "Public policy and internal privacy codes: {Tom
Riley}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905263",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NMB,
author = "Anonymous",
title = "{``Never mind!''} businesses cool off on site license
issue: {Ed Scannell}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905238",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:TPD,
author = "Anonymous",
title = "Tactical planning for data security management:
{Sandra M. Mann Lambert}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905251",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lewis:1988:WPP,
author = "Peter H. Lewis",
title = "When the password is a passkey",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905287",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weber:1988:EAP,
author = "Ron Weber",
title = "Has {EDP} audit progressed in the last 15 years?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--103",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905275",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:RSCa,
author = "Anonymous",
title = "Report says computers spy on 7 million workers in
{US}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "103--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905299",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bozman:1988:ISR,
author = "Jean S. Bozman",
title = "{IBM} slow to remedy leaky {DB2} security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905330",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bozman:1988:USF,
author = "Jean S. Bozman",
title = "Users see flaws in audit trails, access authority",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905342",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1988:ACP,
author = "John M. Carroll and Lynda Robbins",
title = "The automated cryptananysis of polyalphabetic
ciphers",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905354",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hargrove:1988:SIA,
author = "Robert Hargrove",
title = "Secure information is accurate information",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905329",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hunter:1988:DRN,
author = "Philip Hunter",
title = "Disaster recovery needed",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905305",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{McDonald:1988:NDU,
author = "Evelyn C. McDonald",
title = "{North} didn't understand delete function",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "104--104",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905317",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bennett:1988:AEA,
author = "John Bennett",
title = "Analysis of the encryption algorithm used in the
{WordPerfect} word processing program",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "chttp://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905366",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goff:1988:IUT,
author = "Leslie Goff",
title = "{IBM} users told data files could have legal
pitfalls",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905408",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horwitt:1988:OSS,
author = "Elisabeth Horwitt",
title = "{OSI} security system revealed",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905378",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hunter:1988:CTM,
author = "Philip Hunter",
title = "Computer trouble makes {British} skies unfriendly",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890538X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jones:1988:SR,
author = "Stephen Jones and {Senior Editors}",
title = "{LA} sites rocked",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905391",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Munro:1988:NRM,
author = "Neil Munro",
title = "New risk management lab will tackle security needs",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--105",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890541X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Grimm:1988:DEH,
author = "Vanessa Jo Grimm",
title = "Data errors hurt {State Department} system",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "105--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905421",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HMD,
author = "Anonymous",
title = "{Hospital}'s medical data held in strict security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905433",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SIC,
author = "Anonymous",
title = "Security issues concern {NSA}, vendors",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905457",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Betts:1988:ESG,
author = "Mitch Betts",
title = "Encryption standard to get reprieve",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905470",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chandler:1988:LIN,
author = "Harriette L. Chandler",
title = "{LANS} introduce new security issues",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905469",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sopko:1988:FHD,
author = "Sandra Sopko",
title = "Fire and humidity: Data safes protect against both",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--106",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905445",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wong:1988:SOA,
author = "Ken Wong",
title = "Security and office automation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "106--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905482",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCL,
author = "Anonymous",
title = "Development of confidence limits by pivotal functions
for estimating software reliability",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905500",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:FTC,
author = "Anonymous",
title = "Fault tolerant computers and multiprocessing. {January
1985--June 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905494",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{ben-Aaron:1988:TCC,
author = "Diana ben-Aaron and Lee Green",
title = "{Today}'s computer crime: the threat from within",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905548",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Crockett:1988:ASU,
author = "Barton Crockett and Cassimir J. Medford",
title = "After the street's unforgettable week all info systems
are (mostly) go",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905512",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hunter:1988:LSC,
author = "Philip Hunter",
title = "In {London}, stocks up and computers down",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905536",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ko:1988:JMW,
author = "Dorothy Ko",
title = "In {Japan}, {MIS} weathers the storm easily",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "107--107",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905524",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miles:1988:PPP,
author = "J. B. Miles",
title = "Public-private partners work on secure protocols",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "108--108",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905585",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miles:1988:USC,
author = "J. B. Miles",
title = "Unclassified security calls for a `friendly'
approach",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "108--108",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905573",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Munro:1988:ETD,
author = "Neil Munro",
title = "Expert tells {DoD} it needs training, not more
tempest",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "108--108",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905561",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Perry:1988:SSA,
author = "William E. Perry",
title = "Software still is arriving with those annoying bugs",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "108--108",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890555X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:APa,
author = "Anonymous",
title = "Addresses of publications",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "108--110",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905597",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "111--111",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905603",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PF,
author = "Anonymous",
title = "Pages 1--111 ({February 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "1",
pages = "??--??",
month = feb,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:Ea,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "114--114",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903203",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LEa,
author = "Anonymous",
title = "Letters to the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "115--116",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903215",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:RBB,
author = "Anonymous",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "117--127",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903227",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bound:1988:DST,
author = "William A. J. Bound",
title = "Discussing security with top management",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "129--130",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903239",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1988:POH,
author = "Bernard P. Zajac",
title = "Personnel: the other half of data security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "131--132",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903240",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1988:UUP,
author = "Belden Menkus",
title = "Understanding the use of passwords",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "132--136",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903252",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1988:PMM,
author = "G. J. Bologna",
title = "Pitfalls in measuring {MIS} performance",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "137--138",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903264",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murray:1988:AEC,
author = "W. H. Murray",
title = "The application of epidemiology to computer viruses",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "139--145",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903276",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AVA,
author = "Harold Joseph Highland",
title = "Anatomy of a virus attack",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "145--150",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903288",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faak:1988:WVV,
author = "Viiveke F{\aa}k",
title = "Are we vulnerable to a virus attack?. {A} report from
{Sweden}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "151--155",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890329X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:VDA,
author = "Anonymous",
title = "Virus defense alert",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "156, 158",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903306",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:OVP,
author = "Harold Joseph Highland",
title = "An overview of 18 virus protection products",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "157--161",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903318",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HCC,
author = "Harold Joseph Highland",
title = "How to combat a computer virus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "157, 161--163",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890332X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRb,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "165--166",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903331",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1988:ICV,
author = "Fred Cohen",
title = "On the implications of computer viruses and methods of
defense",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "167--184",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903343",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Straub:1988:OSC,
author = "Detmar W. Straub",
title = "Organizational structuring of the computer security
function",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "185--195",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903355",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herschberg:1988:MTH,
author = "I. S. Herschberg",
title = "Make the tigers hunt for you",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "197--203",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903367",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCb,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "205--206",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903379",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WWRb,
author = "Anonymous",
title = "World-wide reports on developments in computer
security: Part {II}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "207--209",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903380",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WSa,
author = "Anonymous",
title = "What others are saying",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "210--212",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903392",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ASV,
author = "Anonymous",
title = "Aftershocks for {Silicon Valley}: {{\em {Richard}
Raysman and Peter Brown}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--213",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903409",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCTa,
author = "Anonymous",
title = "{Dickerson} center of tug-of-war: {{\em Stephen
Jones}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--213",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903422",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HLR,
author = "Anonymous",
title = "Hold that Lawsuit: {{\em Rosemary Hamilton}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--213",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903446",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LPC,
author = "Anonymous",
title = "Legal protection for computer software",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--213",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903410",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MBS,
author = "Anonymous",
title = "{Microsoft}, {Borland} Settle {Dickerson} Case: {{\em
Rachel Parker}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--213",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903434",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CSS,
author = "Anonymous",
title = "Computer security shift is approved by {Senate}: {{\em
{Linda} Greenhouse}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "213--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903458",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HKF,
author = "Anonymous",
title = "{Hong Kong} focus: {{\em Michael D. Pendleton}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903483",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hughes:1988:ARA,
author = "Pamela L. Hughes",
title = "Abstract of recent articles and literature: Radio
frequency interfaces --- Myths, realities and a
practical approach",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903471",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:RIA,
author = "Anonymous",
title = "Remote identification and authentication of computer
resource users: {{\em {Ken} Weiss}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903495",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SVE,
author = "Anonymous",
title = "Security in the {VM} environment: {{\em {William} H.
Murray}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903501",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SWL,
author = "Anonymous",
title = "Shrink-wrap licensing: {{\em Christopher J.
Millard}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--214",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890346X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SPE,
author = "Anonymous",
title = "Security planning for {EFT} network systems: {{\em A.
D. Davis}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "214--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903513",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CUS,
author = "Anonymous",
title = "Computer user surveillance: {{\em Kevin J.
Fitzgerald}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903525",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:BRCb,
author = "Anonymous",
title = "Book Review: {{\booktitle{Computer viruses --- a
secret threat}}: Rudiger Dierstein}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903537",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:H,
author = "Anonymous",
title = "Horatius",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903562",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ICT,
author = "Anonymous",
title = "Insurance and computers: the technology gap: {{\em
David Davis}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903549",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MKF,
author = "Anonymous",
title = "{Manage\slash 38}: {{\em Kevin Fitzgerald}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--215",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903550",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:BTT,
author = "Anonymous",
title = "Buyers turning toward software escrow plans: {{\em
Carole Patton}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "215--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903574",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CFR,
author = "Anonymous",
title = "Conference focuses on reduction of software risks:
{{\em Darryl K. Taft}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903604",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DSP,
author = "Anonymous",
title = "Data security provides the key to lock out intruders:
{{\em {Howard} C. Berkowitz}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903628",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:FTA,
author = "Anonymous",
title = "Faulty tolerance adds security to critical on-line
transactions: {{\em {William} C. Grover}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903586",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HSL,
author = "Anonymous",
title = "How to secure a local area network: {{\em Philip C.
McKinney.}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903598",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SAF,
author = "Anonymous",
title = "{Senate} approves funds for {DEA Tempest} equipment:
{{\em Vanessa Jo Grim}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--216",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903616",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PMT,
author = "Anonymous",
title = "{PC}--mainframe ties hard to guard: {{\em Paula S.
Stone}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "216--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890363X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ASS,
author = "Anonymous",
title = "{Apollo} skirts site license issue: {{\em {James}
Connolly}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903690",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:BM,
author = "Anonymous",
title = "Battling Mediocrity",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903677",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCL,
author = "Anonymous",
title = "Crash course: Lessons in preventing computer downtime:
{{\em {Lee} Green}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903653",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NFG,
author = "Anonymous",
title = "Net failures growing concern in workplace: {{\em Mark
Stevens}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903641",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NNC,
author = "Anonymous",
title = "{NSA}, {NBS} coming together on computer security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903689",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NWL,
author = "Anonymous",
title = "New wave of {LAN} security products hailed by users:
{{\em {Susan} Kerr}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "217--217",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903665",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HSS,
author = "Anonymous",
title = "Hardware, software security devices protect {PCs} and
inside information: {{\em {Robert} L. Scheier}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903720",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MAS,
author = "Anonymous",
title = "{MIS} assumes a shirt-sleeves approach to protecting
power: {{\em Jeff Goodwin}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903756",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MSH,
author = "Anonymous",
title = "Most systems held fast while storm clouds grew on Wall
St: {{\em {Alan} Alper}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903732",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NEW,
author = "Anonymous",
title = "No easy way through data-security maze, consultants
say: {{\em {Robert} L. Scheier}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903719",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SLD,
author = "Anonymous",
title = "Is site licensing a dead issue?: {{\em Stephanie
Wilkinson}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903744",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SSF,
author = "Anonymous",
title = "The structure of system\slash 88, a fault-tolerant
computer: {{\em E. S. Harrison and E. J. Schmitt}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--218",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903707",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:UPS,
author = "Anonymous",
title = "Uninterruptible power supplies",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "218--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903768",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCSa,
author = "Anonymous",
title = "Coalition to combat software piracy: {{\em Rachel
Parker}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903781",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:GYD,
author = "Anonymous",
title = "Guarding your data: {{\em Julie Anderson}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890377X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HPC,
author = "Anonymous",
title = "Hardware protection of communications ports and lines:
{{\em Eugene F. Troy}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903811",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PSP,
author = "Anonymous",
title = "Policies for secure personal data: {Thomas B. Riley}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890380X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SCM,
author = "Anonymous",
title = "Security considerations for minicomputer systems
acquisitions: {{\em Sandra M. Mann Lambert}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903823",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SCU,
author = "Anonymous",
title = "A security checklist for upper management: {{\em
Jerome Lobel}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "219--219",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903793",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:AFA,
author = "Anonymous",
title = "{ANSI}, {Feds} address {DMBS} security: {{\em Mitch
Betts}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903860",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CTL,
author = "Anonymous",
title = "To catch a thief: Lessons in systems security: {{\em
{Michael} Ball}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903884",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CVA,
author = "Anonymous",
title = "The corporate view: {{\em {Alex} Kask}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903835",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:FBL,
author = "Anonymous",
title = "Fuss over bottom line could foil disaster recovery",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903859",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NPD,
author = "Anonymous",
title = "{NASD} power dip could recur: {{\em {Barton}
Crockett}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903872",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WFT,
author = "Anonymous",
title = "Wanted: Full-time contingency planners: {{\em {David}
A. Ludlum}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--220",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903847",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SSG,
author = "Anonymous",
title = "Security systems: Getting management to shell out:
{{\em Larry Stevens}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "220--221",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903896",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DEK,
author = "Anonymous",
title = "Data encryption is key to safe file transmission:
{{\em Lawrence E. Hughes}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "221--221",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903926",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ESNa,
author = "Anonymous",
title = "Expert sees national security risks in {BASIS} net:
{{\em {Wayne} Madsen}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "221--221",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903902",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LGH,
author = "Anonymous",
title = "Loophole gives hackers access to {DEC} machines: {{\em
Marlene Brown}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "221--221",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903938",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NNS,
author = "Anonymous",
title = "{NBS} and {NSA} stand on different sides of security:
{{\em Evelyn C. MacDonald.}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "221--221",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903914",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ESV,
author = "Anonymous",
title = "Evaluating signature verification systems is tricky:
{{\em {Rodney} Beatson}}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "221--222",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890394X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "224--224",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888903951",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PAa,
author = "Anonymous",
title = "Pages 114--224 ({April 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "2",
pages = "??--??",
month = apr,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highlands:1988:E,
author = "Dr. Harold Joseph Highlands",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "228--228",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900168",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LEb,
author = "Anonymous",
title = "Letters to the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "229--231",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890017X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:OSH,
author = "Dr. Harold Joseph Highland",
title = "{Open Sesame} --- Hackers welcome",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "232--233",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900181",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SDD,
author = "Dr. Harold Joseph Highland",
title = "Security director's dilemma",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "233--235",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900193",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HTV,
author = "Dr. Harold Joseph Highland",
title = "How to test a virus filter without a virus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "235--237",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890020X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VDR,
author = "Dr. Harold Joseph Highland",
title = "Virus disaster red book",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "237--237",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900211",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:BCV,
author = "Dr. Harold Joseph Highland",
title = "Blitzed by a computer virus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "237--239",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900223",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SVP,
author = "Dr. Harold Joseph Highland",
title = "Special virus protection measures",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "239--242",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900235",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:UCN,
author = "Dr. Harold Joseph Highland",
title = "Upcoming conferences of note",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "242--243",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900247",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SWS,
author = "Dr. Harold Joseph Highland",
title = "Star wars security or where did those micros go?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "243--244",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900259",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1988:MIS,
author = "Jack Bologna",
title = "Managing an information system crisis",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "245--247",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900260",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1988:DDP,
author = "Bernard P. Zajac",
title = "Distributed data processing: New problems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "249--250",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900272",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Milor:1988:CSA,
author = "G. Will Milor",
title = "The computer security act of 1987",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "251--253",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900284",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{David:1988:TVF,
author = "Jon David",
title = "Treating viral fever",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "255--258",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900296",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:RLV,
author = "Anonymous",
title = "Revised list of virus filters",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "259--260",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900302",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1988:B,
author = "Belden Menkus",
title = "Breakpoints",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "261--268",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900314",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRc,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "269--270",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900326",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanBiene-Hershey:1988:TEA,
author = "Margaret E. van Biene-Hershey",
title = "The technical {EDP}-audit function",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "271--277",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900338",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1988:DPC,
author = "Fred Cohen",
title = "Designing provably correct information networks with
digital diodes",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "279--286",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890034X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pluimakers:1988:SNA,
author = "G. M. J. Pluimakers",
title = "Some notes on authorization and transaction management
in distributed database systems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "287--298",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900351",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{VanderBank:1988:CFM,
author = "Dirk {Van der Bank} and Edwin Anderssen",
title = "Cryptographic figures of merit",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "299--303",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900363",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCc,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "305--306",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HIT,
author = "Anonymous",
title = "Highlights of {IFIP TC 11} meeting",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "307--308",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900387",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RFN,
author = "Dr. Harold Joseph Highland",
title = "Report on the fourth national computer security
conference: {COMPSEC IV}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "309--311",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900399",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paans:1988:SEC,
author = "Dr. Ronald Paans",
title = "The second {European} conference on computer audit,
control and security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "312--315",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WSb,
author = "Anonymous",
title = "What others are saying",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "316--319",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HWN,
author = "Esther H. Highland",
title = "{HR} 145: {What}'s next",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "320--320",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900442",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RRM,
author = "Esther H. Highland",
title = "Recent rulings may give states copyright immunity",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "320--320",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900429",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SAS,
author = "Esther H. Highland",
title = "Security act is signed: Copyright Bill backed",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "320--320",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900430",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CSF,
author = "Esther H. Highland",
title = "Computer security: the federal approach",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "320--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900454",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:BCL,
author = "Esther H. Highland",
title = "{Brazil} copyright law could thwart pirates",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900478",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CCS,
author = "Esther H. Highland",
title = "Computer cross sections unite at law conference",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900491",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HLR,
author = "Esther H. Highland",
title = "Hashing out legal rights",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890051X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:LAL,
author = "Esther H. Highland",
title = "Long arm of the law",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890048X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NSL,
author = "Esther H. Highland",
title = "New security law compels federal agencies to act",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900466",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PCN,
author = "Esther H. Highland",
title = "Personal but not confidential: a new debate over
privacy",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--321",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900508",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ASM,
author = "Esther H. Highland",
title = "{Apple} slaps {Microsoft}, {HP} with copyright suit",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "321--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900521",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ALU,
author = "Esther H. Highland",
title = "Are {Apple} and {Lotus} unfair?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ELS,
author = "Esther H. Highland",
title = "Exec liable in software copy case, court rules",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900569",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HBW,
author = "Esther H. Highland",
title = "{House Bill} would increase 1989 funding for {NBS}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900570",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HPMb,
author = "Esther H. Highland",
title = "{H-P}, {Microsoft} respond to {Apple} copyright suit",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900545",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:IPS,
author = "Esther H. Highland",
title = "Information property: Some intellectual property
aspects of the global information economy",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:LFD,
author = "Esther H. Highland",
title = "The {``look} and {feel''} debate",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--322",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900533",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CIG,
author = "Esther H. Highland",
title = "Computer insurance: the gaps",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "322--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900594",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CW,
author = "Esther H. Highland",
title = "Computer weekly",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900661",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DRP,
author = "Esther H. Highland",
title = "Disaster recovery planning",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900624",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:LPS,
author = "Esther H. Highland",
title = "Legal protection of software in the {United Kingdom}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900636",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PAV,
author = "Esther H. Highland",
title = "{Pentagon} attacks viruses",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900648",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SAC,
author = "Esther H. Highland",
title = "Secure access control and {MAC}-based signatures",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900600",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TSA,
author = "Esther H. Highland",
title = "Typical system access control problems and solutions",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900612",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VCK,
author = "Esther H. Highland",
title = "Virus that could kill",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--323",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890065X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NSG,
author = "Esther H. Highland",
title = "{NSA} suppresses {GAO} report",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "323--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900673",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CBP,
author = "Esther H. Highland",
title = "Computer backup pools, disaster recovery, and default
risk",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900727",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:LS,
author = "Esther H. Highland",
title = "{LAN} security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900697",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TL,
author = "Esther H. Highland",
title = "Tangible losses",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900715",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TM,
author = "Esther H. Highland",
title = "{Tempest} micros",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900685",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:UST,
author = "Esther H. Highland",
title = "Unprotected symphony tunes up",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--324",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900703",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RBI,
author = "Esther H. Highland",
title = "Red book includes a metaphysical look at security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "324--325",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900739",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CSU,
author = "Esther H. Highland",
title = "Computer systems under siege",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "325--325",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900752",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CVS,
author = "Esther H. Highland",
title = "Computer viruses spread",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "325--325",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900764",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SHV,
author = "Esther H. Highland",
title = "Software, hardware ``vaccines'' stem threat of deadly
computer viruses",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "325--325",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900776",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SSY,
author = "Esther H. Highland",
title = "Security and software: Are you fully insured?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "325--325",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900740",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DFC,
author = "Esther H. Highland",
title = "{DOD} fights off computer virus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "325--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900788",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MSC,
author = "Esther H. Highland",
title = "Microcomputer security and control",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900806",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NEG,
author = "Esther H. Highland",
title = "New emphasis given to {UNIX} security problems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900818",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SCD,
author = "Esther H. Highland",
title = "Satellite communications for disaster recovery",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900843",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SCC,
author = "Esther H. Highland",
title = "{``Safe computing''} catching",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900831",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:UNR,
author = "Esther H. Highland",
title = "Under new rule, auditors must search out fraud",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890082X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VGB,
author = "Esther H. Highland",
title = "A virus gives business a chill",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--326",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890079X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CSG,
author = "Esther H. Highland",
title = "Calamities spark growing field",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "326--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900855",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CCM,
author = "Esther H. Highland",
title = "Computer crime: {MIS} confronts a cancer",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900909",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:FTI,
author = "Esther H. Highland",
title = "Fault tolerance increasingly important for {LANS}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900879",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PCB,
author = "Esther H. Highland",
title = "Planning, consulting boost biometric bill",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900892",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SDS,
author = "Esther H. Highland",
title = "Structing the data security program",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900910",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SSR,
author = "Esther H. Highland",
title = "Security systems rescue data from snoopers, user
blunders",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900867",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VFR,
author = "Esther H. Highland",
title = "Voice, finger and retina scans: Can biometrics secure
your shop?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--327",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900880",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VEV,
author = "Esther H. Highland",
title = "{VMSecure}: Enhancing {VM} security and control",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "327--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900922",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DCS,
author = "Esther H. Highland",
title = "{DEC} computer security tactics come into focus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890096X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DDS,
author = "Esther H. Highland",
title = "Decentralized {DP} sites seen lacking in recovery
planning",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900971",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DSF,
author = "Esther H. Highland",
title = "Disturbance in several forms",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900958",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PQI,
author = "Esther H. Highland",
title = "Power quality issues smack micro market",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900946",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SAP,
author = "Esther H. Highland",
title = "A sensible approach to protecting your data",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900983",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:WAU,
author = "Esther H. Highland",
title = "What about users should know about {PC} security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--328",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900934",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PME,
author = "Esther H. Highland",
title = "Preventive measures to ensure {PC} data security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "328--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900995",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:IDS,
author = "Esther H. Highland",
title = "An introduction to database security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901046",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MPP,
author = "Esther H. Highland",
title = "Make a plan for {PC} disaster recovery",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901009",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PWS,
author = "Esther H. Highland",
title = "Programmer workstation security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901058",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RPB,
author = "Esther H. Highland",
title = "Reliable power: Beyond the big box",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TSC,
author = "Esther H. Highland",
title = "Top secret --- Concepts and implementation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901034",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:WTS,
author = "Esther H. Highland",
title = "When trouble strikes, a {UPS} can save the data",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--329",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901010",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CMP,
author = "Esther H. Highland",
title = "{It}'s critical to make {PC} security as flexible as
{PCs} themselves",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "329--330",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890106X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MRO,
author = "Esther H. Highland",
title = "{MCSC} regs outline basic security level for {PCs}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "330--330",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SBC,
author = "Anonymous",
title = "Security basics for cable\slash video display
radiation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "330--331",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901083",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "332--332",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901095",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PJ,
author = "Anonymous",
title = "Pages 228--332 ({June 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "3",
pages = "??--??",
month = jun,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:Eb,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "334--334",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905615",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1988:EIC,
author = "Frederick Cohen",
title = "Ethical issues in computer virus distribution",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "335--336",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905627",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HOC,
author = "Harold Joseph Highland",
title = "How to obtain a computer virus",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "337--337",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905639",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VAS,
author = "Harold Joseph Highland",
title = "Are virus attack statistics reliable?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "338--338",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905640",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HR,
author = "Harold Joseph Highland",
title = "Hackers revisited",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "339--339",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905652",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NVT,
author = "Harold Joseph Highland",
title = "New video terminal law",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "340--340",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905664",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:EEM,
author = "Harold Joseph Highland",
title = "Electromagnetic eavesdropping machines for
{Christmas}?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "341--341",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905676",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TT,
author = "Harold Joseph Highland",
title = "Tips on terrorism",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "344--344",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905688",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:IRV,
author = "Harold Joseph Highland",
title = "Investigating a reported virus attack",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "344--345",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890569X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VFUa,
author = "Harold Joseph Highland",
title = "Virus filter update",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "345--345",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905706",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:F,
author = "Anonymous",
title = "Footnote",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "346--346",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905718",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Madsen:1988:WMT,
author = "C. Wayne Madsen",
title = "The world meganetwork and terrorism",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "347--352",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890572X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1988:SRH,
author = "Jack Bologna",
title = "Selection risks in hiring information systems
personnel",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "353--355",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905731",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AD,
author = "Harold Joseph Highland",
title = "The anatomy of a {DOS} Disk",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "357--360",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905743",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1988:UGA,
author = "Belden Menkus",
title = "{U.S. Government} agencies belatedly address
information system security issues",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "361--366",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905755",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:BVF,
author = "Harold Joseph Highland",
title = "The brain virus: Fact and fantasy",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "367--370",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905767",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRd,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "371--372",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905779",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Summers:1988:PAK,
author = "Rita C. Summers and Stanley A. Kurzban",
title = "Potential applications of knowledge-based methods to
computer security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "373--385",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905780",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{McHugh:1988:MSI,
author = "John McHugh and Bhavani M. Thuraisingham",
title = "Multilevel security issues in distributed database
management systems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "387--396",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905792",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Witten:1988:PAA,
author = "Ian H. Witten and John G. Cleary",
title = "On the privacy afforded by adaptive text compression",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "397--408",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905809",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1988:TSF,
author = "Fred Cohen and Stephen Bruhns",
title = "Two secure file servers",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "409--414",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905810",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCd,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "415--416",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905822",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:WWRc,
author = "Anonymous",
title = "World-wide reports on developments in computer
security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "417--422",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905834",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AFR,
author = "Esther H. Highland",
title = "{Apple} files response to {Microsoft}'s countersuit:
Laurie Flynn {InfoWorld}, {May} 2, 1988, p. 5",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890586X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AMSa,
author = "Esther H. Highland",
title = "{Apple\slash Microsoft} suit split in two: {Rachel
Parker, InfoWorld, May 23, 1988, p. 1}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905883",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AMSb,
author = "Esther H. Highland",
title = "{Apple--Microsoft} suit raises issue of vague copyright
laws: {Robert Francis, Datamation, May 15, 1988, pp.
22, 26}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905895",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RDM,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Dispute over Mac user interface
longstanding}}: Stuart J. Johnston, InfoWorld, April
25, 1988, p. 33}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905858",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RMC,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Microsoft charges Apple with
breach of contract}}: Stuart J. Johnston and Rachel
Parker InfoWorld, April 11, 1988, pp. 1, 81}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905846",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MSSa,
author = "Esther H. Highland",
title = "{Microsoft} seeks to split {Apple} suit into two
phases: {Rachel Parker, InfoWorld, May 23, 1988, p.
5}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--423",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905871",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MOO,
author = "Esther H. Highland",
title = "{MBS}, {OPM} officials plan broad security guidelines:
{Kevin Power, Government Computer News, May 13, 1988,
pp. 1, 92}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "423--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905901",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ARF,
author = "Esther H. Highland",
title = "Agencies ready forces for data security campaign:
{Robert V. Head, Government Computer News, May 27,
1988, pp. 27, 31}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905913",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CIK,
author = "Esther H. Highland",
title = "Computer insecurity: {Ken McLeod, Information Age,
April 1988, pp. 89--93}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905962",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RRO,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Reliance on optical fibres to
increase telecommunication security}}: Alan H.
Friedberg, Robert M. Harper and Michael J. Cerullo,
Information Age, April 1988, pp. 73--78}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905937",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SCN,
author = "Esther H. Highland",
title = "Smart cards: a new tool for identification and access
protection: {Rola Krayem, Information Age, April 1988,
pp. 85--88}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905950",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SOD,
author = "Esther H. Highland",
title = "Security, {OSI} and distributed systems: {T. Knowles
Information Age, April 1988, pp. 79--84}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905949",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RUS,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Unix system security issues}}:
Michael J. Knox and Edward D. Bowden, Information Age,
April, 1988, pp. 67--72}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905925",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RUU,
author = "Esther H. Highland",
title = "Review: {{\booktitle{UFS: User-friendly security}}:
Alan R. Krull Computer Control Quarterly, Spring 1988,
pp. 1--9}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--424",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905974",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:REG,
author = "Esther H. Highland",
title = "Review: {{\booktitle{The executives guide to
workstation management and data security}}: Mark Goode
Computer Control Quarterly, Spring 1988, pp. 10--17}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "424--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905986",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CWT,
author = "Esther H. Highland",
title = "Can we trust computers?: {Andrew M. Lister, Computer
Control Quarterly, Spring 1988, pp. 31--35}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906001",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:IHD,
author = "Esther H. Highland",
title = "Insurance and the hacker: {David Davies, Computer
Control Quarterly, Spring 1988, pp. 28--30}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888905998",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MSR,
author = "Esther H. Highland",
title = "Media security: {Ralph M. Smole, Computer Control
Quarterly, Spring 1988, pp. 36--37}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906013",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MVSa,
author = "Esther H. Highland",
title = "{Mac} virus surfaces in {Washington}: {Nick Arnett
InfoWorld, April 11, 1988, pp. 1, 3}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906025",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NBE,
author = "Esther H. Highland",
title = "A nasty bug: Editorial {Computerworld, April 4, 1988,
p. 18}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906049",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RNV,
author = "Esther H. Highland",
title = "Review: {{\booktitle{New virus damaging Mac data,
group says}}: Scott Mace InfoWorld, April 11, 1988, p.
29}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--425",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906037",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SEG,
author = "Esther H. Highland",
title = "Security expert gives advice on computer viruses: {Tim
McGraw, Government Computer News, April 15, 1988, p.
17}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "425--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906050",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ARAa,
author = "Esther H. Highland",
title = "{Apple} releases ``anti-viral'' program: {Nick Arnett
InfoWorld, May 2, 1988, p. 8}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906086",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CVC,
author = "Esther H. Highland",
title = "Computer viruses can infect entire organizations:
{Angel L. Rivera, Government Computer News, April 29,
1988, pp. 37, 43}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906098",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:FOP,
author = "Esther H. Highland",
title = "{Federal} officials puzzled by computer virus attacks:
{Neil Munro and Richard A. Dance, Government Computer
News, April 29, 1988, p. 89}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906074",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MVD,
author = "Esther H. Highland",
title = "{Mac} virus discovered at {EPA}, vaccination called
successful: {Richard A. Danca, Government Computer
News, May 13, 1988, p. 4}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906104",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MVSb,
author = "Esther H. Highland",
title = "{Macintosh} virus seeks {EDS} signatures: {Nick Arnett
InfoWorld, April 25, 1988, p. 8}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--426",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906062",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SHB,
author = "Esther H. Highland",
title = "Security habits build healthy software: {David J.
Stang, Government Computer News, May 27, 1988, p. 53}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "426--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906116",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:RSCb,
author = "Anonymous",
title = "Review: {{\booktitle{Spread of computer viruses
worries users}}: John Voelcher The Institute, IEEE
Spectrum, June 1988, p. 1 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906177",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RCG,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Confronting the growing threat of
harmful computer software viruses}}: Jim Seymour and
Jonathan Matzkin PC Magazine, June 28, 1988, pp.
33--35}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906153",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HBC,
author = "Esther H. Highland",
title = "The hype behind computer viruses: Their bark may be
worse than their ``byte'': {Paul Karon PC Week, May 31,
1988, pp. 49, 53}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890613X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HVP,
author = "Esther H. Highland",
title = "How vaccine programs work: {Neil J. Rothenberg, PC
Magazine, June 28, 1988, p. 35}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VIC,
author = "Esther H. Highland",
title = "Viruses infect corporate {MIS}: {Alan J. Ryan,
Computerworld, May 30, 1988, pp. 29, 31}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906128",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VPU,
author = "Esther H. Highland",
title = "Virus-plagued user warned of snake-oil pitch: {Robert
L. Scheirer, PC Week, May 10, 1988, p. 170}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--427",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906141",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:OAC,
author = "Esther H. Highland",
title = "{OMB} advocates control model for systems security:
{Kevin Power, Government Computer News, March 18, 1988,
p. 21}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "427--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906189",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HME,
author = "Esther H. Highland",
title = "How much is enough? {Expert} says security efforts
should pay, not cost: {William Murray, Computerworld
Focus, April 6, 1988, p. 30 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906232",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:HSY,
author = "Esther H. Highland",
title = "How safe is your data: {Joseph} M. Pujals Information
Center, {April} 1988, p. 46",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906219",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ICH,
author = "Esther H. Highland",
title = "It can't happen here: {Patricia Keefe, Computerworld
Focus, April 6, 1988, pp. 13--16}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906244",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RPAa,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Problems in auditing expert
system development}}: Wayne J. Socha, Edpacs, March
1988, pp. 1--6}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906190",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RSC,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Security concerns in a local area
network environment}}: Michael I. Sobol,
Telecommunications, March 1988, p. 96 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906207",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SCP,
author = "Esther H. Highland",
title = "{SPA} cracks down on piracy, raids computer retailer:
{Nick Arnett InfoWorld, April 4, 1988, p. 6}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--428",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906220",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RBR,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Breach reported in U.S.
computers}}: John Markoff, The New York Times, April
18, 1988, pp. A1, A19}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "428--429",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906256",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MPW,
author = "Esther H. Highland",
title = "Monitoring points out weak spots: {Gardner Terrell,
Government Computer News, April 29, 1988, pp. 1, 88}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "429--429",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RTF,
author = "Esther H. Highland",
title = "Risk! {The} third factor: {Paul Tate, Datamation,
April 15, 1988, p. 58 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "429--429",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906293",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SPG,
author = "Esther H. Highland",
title = "Security problems greater than ever: {Barbara Bates,
Information WEEK, April 18, 1988, p. 48}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "429--429",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906281",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SWH,
author = "Esther H. Highland",
title = "Stalking the Wily Hacker: {Clifford Stoll,
Communications of the ACM, May 1988, pp. 484--497}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "429--429",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890627X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TCT,
author = "Esther H. Highland",
title = "Tough countermeasures thwart hackers who attack vital
data: {Ram Pemmaraju, Computer Technology Review, April
1988, p. 8 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "429--430",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890630X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:AFA,
author = "Esther H. Highland",
title = "Agencies fail to appreciate threat to data security:
{Belden Menkus, Government Computer New, April 29,
1988, p. 36}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "430--430",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906347",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RLM,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Loose MIPS sink ships}}: W. Mark
Goode, Government Data Systems, April 1988, pp.
12--13}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "430--430",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906335",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:LSP,
author = "Esther H. Highland",
title = "{LAN} security problem detected on {Navy} ships: {Brad
Bass, Government Computer News, April 1, 1988, pp. 1,
84}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "430--430",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906323",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TSV,
author = "Esther H. Highland",
title = "Top secret, and vulnerable: {John Markoff, The New
York Times, April 25, 1988, pp. D1, D4}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "430--430",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:OSW,
author = "Esther H. Highland",
title = "Operating system is weak link in {MVS} security:
{Brian Currah, Government Computer News, April 29,
1988, p. 44}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "430--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906359",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:DRM,
author = "Esther H. Highland",
title = "Despite regs, most agencies lack disaster plan: {Tari
Schreider, Government Computer News, April 29, 1988, p.
54}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906402",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:MSSb,
author = "Esther H. Highland",
title = "Micro security system effective even on laptops:
{Peter Stevenson, Government Computer News, April 29,
1988, p. 48}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906384",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:NRH,
author = "Esther H. Highland",
title = "{NSA} regs hinder inexpensive network security:
{Barbara Bates, Government Computer News, April 29,
1988, pp. 50, 54}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:PEM,
author = "Esther H. Highland",
title = "Picking encryption method is no time for secrets:
{Harold Joseph Highland, Government Computer News,
April 29, 1988, p. 39}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906360",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RPP,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Proper procedures are final
security safeguard}}: Christine E. Howkins, Government
Computer News, April 29, 1988, p. 40}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--431",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906372",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RRC,
author = "Esther H. Highland",
title = "A redundancy reducing cipher: {Peter Wayner,
Cryptologia, April 1988, pp. 107--112}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "431--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906414",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:FKC,
author = "Esther H. Highland",
title = "Fire {KOs} {Chicago} networks: {Jean S. Bozman,
Computerworld, May 16, 1988, pp. 1, 121}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906451",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RLR,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Lotus removes 1--2--3
protection}}: Douglas Barney, Computerworld, May 16,
1988, p. 5}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890644X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RPAb,
author = "Esther H. Highland",
title = "Review: {{\booktitle{Planning averts disaster at L.A.
Bond trading firm}}: James A. Martin, Computerworld,
May 9, 1988, p. 4}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906463",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:SSE,
author = "Esther H. Highland",
title = "Speakers say employee attitude is key to security:
{Kevin Power, Computerworld, May 13, 1988, p. 14}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906426",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TIE,
author = "Esther H. Highland",
title = "Taming the indoor elements: {Nina Frank, Digital
Review, May 16, 1988, pp. 91--93}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906475",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:TMS,
author = "Esther H. Highland",
title = "Technology makes security of voice and data against
sabotage both effective and affordable: {Paul Kirvan,
Communications News, May 1988, pp. 82--83}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--432",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906438",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CSN,
author = "Esther H. Highland",
title = "Computer systems need isolated ground that is safe and
noise free: {Thomas M. Gruzs, Computer Technology
Review, Spring 1988, p. 103 ff}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "432--433",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:APb,
author = "Anonymous",
title = "Addresses of publications",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "433--433",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ITD,
author = "Esther H. Highland",
title = "Information technology and dataveillance: {Roger A.
Clarke, Communications of the ACM, May 1988, pp.
498--512}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "433--433",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:Cd,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "435--435",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888906517",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PAb,
author = "Anonymous",
title = "Pages 334--435 ({August 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "4",
pages = "??--??",
month = aug,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:Ec,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "438--438",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901897",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:UCC,
author = "Harold Joseph Highland",
title = "{U.S. Congress} computer virus report",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "439--439",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:WPT,
author = "Harold Joseph Highland",
title = "Write-protect tab warning",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "439--439",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901915",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VFE,
author = "Harold Joseph Highland",
title = "Virus filter evaluation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "440--440",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901927",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:VFUb,
author = "Harold Joseph Highland",
title = "Virus filter update",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "441--442",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901939",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:CVM,
author = "Harold Joseph Highland",
title = "Computer viruses: Media hyperbole, errors and
ignorance",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "442--450",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901940",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Glath:1988:CGV,
author = "Raymond M. Glath",
title = "The case of the {``Gerbil virus''} that wasn't",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "451--453",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901952",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1988:CIS,
author = "Charles Cresson Wood",
title = "A context for information systems security planning",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "455--465",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901964",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schweitzer:1988:SNB,
author = "Jim Schweitzer",
title = "Security news briefs",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "467--469",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901976",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1988:VSW,
author = "Bernard P. Zajac",
title = "Viruses: Should we quit talking about them?",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "471--472",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888901988",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRe,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "473--474",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890199X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1988:PPT,
author = "John M. Carroll and Robert B. Mowat and Lynda E.
Robbins and David Wiseman",
title = "The password predictor --- a training aid for raising
security awareness",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "475--481",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902003",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitchell:1988:SMS,
author = "Chris Mitchell and Michael Walker",
title = "Solutions to the multidestination secure electronic
mail problem",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "483--488",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902015",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1988:MPP,
author = "Fred Cohen",
title = "Maintaining a poor person's information integrity",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "489--494",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902027",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pfleeger:1988:TFA,
author = "Charles P. Pfleeger and Shari Lawrence Pfleeger",
title = "A transaction flow approach to software security
certification for document handling systems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "495--502",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902039",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:1988:SWP,
author = "Yue Jiang Huang and Fred Cohen",
title = "Some weak points of one fast cryptographic checksum
algorithm and its improvement",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "503--505",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCe,
author = "Anonymous",
title = "{IFIP} Technical Committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "507--508",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CISa,
author = "Anonymous",
title = "Computer information security and protection. {June
1985--April 1987} (Citations from the {NTIS}
database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "509--509",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zaritsky:1988:MSI,
author = "I. S. Zaritsky",
title = "Microcomputer security issues in an office
environment",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "509--509",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tonn:1988:AIR,
author = "B. E. Tonn and C. B. Travis and L. Arrowood and R.
Goeltz and C. A. Mann",
title = "Analysis of individual risk belief structures",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "509--510",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902088",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CDP,
author = "Anonymous",
title = "Computer disasters: Prevention and recovery.
{1975--September 1986} (Citations from the {INSPEC:
Information Services for the Physics and Engineering
Communities} Database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "510--510",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890209X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Burnham:1988:DES,
author = "B. Burnham",
title = "{DES} (Data Encryption Standard) cryptographic
services designed for the {DOE} wide band
communications network",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "510--510",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890212X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Peercy:1988:RAM,
author = "D. E. Peercy and M. D. Estill and K. L. Shaw",
title = "Risk Assessment Methodology for Software
Supportability {(RAMSS)}: {User}'s handbook",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "510--510",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902118",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Peercy:1988:SSR,
author = "D. E. Peercy and W. Huebner and M. D. Estill and J. C.
Wu",
title = "Software supportability risk assessment in {OT\&E}
(Operational Test and Evaluation): Historical baselines
for risk profiles. Volumes 1 and 2",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "510--510",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:1988:IRC,
author = "A. Jung",
title = "Implementing the {RSA} cryptosystem",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "510--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CISb,
author = "Anonymous",
title = "Computer information security and protection.
{November 1986--October 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902179",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CPE,
author = "Anonymous",
title = "Computer performance evaluation. {July 1983--April
1988} (citations from the {NTIS} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902180",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DESa,
author = "Anonymous",
title = "{Data Encryption Standard. January 1975--January 1988
(citations from the INSPEC: Information Services for
the Physics and Engineering Communications Database)}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DESb,
author = "Anonymous",
title = "Data encryption standard. {1975--January 1987}
(citations from the {INSPEC: Information Services for
the Physics and Engineering Communities} Database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902155",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SSV,
author = "Anonymous",
title = "Secure software verification tools",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gaglione:1988:ITP,
author = "A. M. Gaglione",
title = "Information theory and public key cryptosystems",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "511--511",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902167",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IPRa,
author = "Anonymous",
title = "Intellectual property rights in an age of electronics
and information. {Contractor} documents. {Volume} 1",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890226X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MDS,
author = "Anonymous",
title = "Microcomputers: Data and software security.
{1974--February 1987} (citations from the {INSPEC}:
{Information Services for the Physics and Engineering
Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MML,
author = "Anonymous",
title = "Microcomputer to mainframe links. {January
1975--February 1988} (citations from the {INSPEC:
Information Services for the Physics and Engineering
Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902210",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baum:1988:ESS,
author = "William E. Baum and Judith H. Podell and G. N.
Romstedt",
title = "Expert system for software quality assurance",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902258",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{David:1988:UCE,
author = "H. David and J. Roelofsen",
title = "Use of colour on electronic data displays (second
study)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902222",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sherman:1988:CVV,
author = "A. T. Sherman",
title = "Cryptology and {VLSI (Very Large Scale Integration)}.
{I}. {Detecting} and exploiting algebraic weaknesses in
cryptosystems. {II}. {Algorithms} for placing modules
on a custom {VLSI} chip",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902234",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Villarreal:1988:IW,
author = "J. Villarreal",
title = "Innovative workstation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "512--512",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Allen:1988:DAR,
author = "Bruce M. Allen",
title = "Data acquisition, reduction, and analysis using a
microcomputer",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902301",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCJa,
author = "Anonymous",
title = "Computer crime. {January 1975--October 1986}
(citations from the {INSPEC: Information Services for
the Physics and Engineering Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902283",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCN,
author = "Anonymous",
title = "Computer crime. {November 1986--October 1987}
(citations from the {INSPEC: Information Services for
the Physics and Engineering Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902295",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IPRb,
author = "Anonymous",
title = "Intellectual property rights in an age of electronics
and information. {Contractor} documents. {Volume} 2",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SSP,
author = "Anonymous",
title = "Software security and piracy. {February 1984--March
1986} (citations from the {INSPEC: Information Services
for the Physics and Engineering Communities}
database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902325",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Braum:1988:SCD,
author = "H. Braum",
title = "Security considerations --- defence-related and
commercial",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--513",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Malkoff:1988:RTF,
author = "D. B. Malkoff",
title = "Real-time fault detection and diagnosis: the use of
learning expert systems to handle the timing of
events",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "513--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:MMF,
author = "Anonymous",
title = "Microcomputer modems. {1975--February 1987} (citations
from the {INSPEC: Information Services for the Physics
and Engineering Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902386",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Linn:1988:TOO,
author = "R. J. Linn and J. S. Nightingale",
title = "Testing {OSI (Open Systems Interconnection)} protocols
at the {National Bureau of Standards}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lundberg:1988:CCA,
author = "B. G. Lundberg",
title = "{CONST} --- a constructive approach to information
modelling",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902362",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Snyder:1988:DQS,
author = "C. E. Snyder",
title = "Data quality: a strategic perspective",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902350",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tanca:1988:EES,
author = "L. Tanca and S. Ceri",
title = "{ELAND}: an expert system for the configuration of
local area networks applications",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--514",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902374",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CNS,
author = "Anonymous",
title = "Computer network standards. {1975--February 1987}
(citations from the {INSPEC: Information Services for
the Physics and Engineering Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "514--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902398",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ECN,
author = "Anonymous",
title = "{Ethernet} communication networks. 1978-1986
(citations from the {INSPEC: Information Services for
the Physics and Engineering Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902428",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:LAN,
author = "Anonymous",
title = "Local area networks. {January 1986--December 1986}
(citations from the engineering index database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890243X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chien:1988:CCR,
author = "A. A. Chien",
title = "Congestion control in routing networks",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902416",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Frankel:1988:GSP,
author = "S. Frankel",
title = "Guidance on software package selection",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Greene:1988:STAa,
author = "Joseph S. Greene and T. Probert and W. Riddle and C.
Giese and T. L. Quindry",
title = "Software Technology for Adaptable, Reliable Systems
{(STARS)} program management plan",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902453",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kimball:1988:CCF,
author = "Mary C. Kimball",
title = "Central computer facility software directory",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--515",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Greene:1988:STAb,
author = "Joseph S. Greene and T. Probert and W. Riddle and C.
Giese and T. L. Quindry",
title = "Software Technology for Adaptable, Reliable Systems
{(STARS)} technical program plan",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "515--516",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902465",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mueller-Boeling:1988:ISB,
author = "D. Mueller-Boeling",
title = "{Informationstechnik aus der Sicht der Benutzer im
Wandel des letzten Jahrezehnts} ({Information}
technology from the point of the user during the last
decade)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "516--516",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nicholson:1988:MDA,
author = "W. L. Nicholson and P. J. Cowley and D. B. Carr and M.
A. Whiting",
title = "Managing the data analysis process",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "516--516",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902477",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Osborne:1988:ABS,
author = "W. M. Osborne and R. Raigrodski",
title = "Annotated bibliography on software maintenance",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "516--516",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902489",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wong:1988:MOS,
author = "W. Wong",
title = "Management overview of software reuse",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "516--516",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902490",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hurford:1988:UUA,
author = "J. M. Hurford and C. A. Ramsey",
title = "Understanding user attitudes: the cornerstone of
computer documentation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "516--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SQMa,
author = "Anonymous",
title = "Software quality and metrics. {January 1975--December
1986} (citations from the {INSPEC: Information Services
for the Physics and Engineering Communities}
database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890257X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holt:1988:SEE,
author = "H. M. Holt",
title = "Software error experiment",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902520",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kiefhaber:1988:NSW,
author = "A. Kiefhaber",
title = "National survey of worksite health promotion programs,
1985",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902532",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolodner:1988:RUV,
author = "E. K. Kolodner",
title = "Recovery using virtual memory",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902544",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miller:1988:GPS,
author = "D. F. Miller",
title = "Guidelines for preparing software user documentation",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902568",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Requa:1988:WMC,
author = "J. Requa",
title = "Workstation\slash mainframe connection",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--517",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902556",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SQMb,
author = "Anonymous",
title = "Software quality and metrics. {January 1987--December
1987} (citations from the {INSPEC: Information Services
for the Physics and Engineering Communities}
database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "517--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902581",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCJb,
author = "Anonymous",
title = "Cryptography and cryptosystems. {January
1987--December 1987} (citations from the {INSPEC:
Information Services for the Physics and Engineering
Communities} database)",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902593",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CSM,
author = "Anonymous",
title = "Computer software maintenance. {January 1970--August
1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902635",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CST,
author = "Anonymous",
title = "Computer software transferability and portability.
{January 1970--August 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902647",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CVR,
author = "Anonymous",
title = "Computer voice recognition: Market aspects. {January
1983--July 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902623",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCTb,
author = "Anonymous",
title = "Data compression: Techniques and applications.
{October 1983--September 1986}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902611",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:HRC,
author = "Anonymous",
title = "Handwriting recognition by computer. {January
1970--August 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902659",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Voigt:1988:DRT,
author = "R. J. Voigt",
title = "Design of a real time operating system for a fault
tolerant microcomputer",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--518",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890260X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SCJ,
author = "Anonymous",
title = "Smart cards. {January 1983--August 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "518--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902660",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCJc,
author = "Anonymous",
title = "Cryptography and cryptosystems. {January 1970--October
1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902738",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCD,
author = "Anonymous",
title = "Directory of computerized data files, 1987",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902672",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCTc,
author = "Anonymous",
title = "Data compression: Techniques and applications.
{October 1983--September 1986}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902684",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:DCTd,
author = "Anonymous",
title = "Data compression: Techniques and applications.
{October 1986--September 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902696",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ESNb,
author = "Anonymous",
title = "Expert systems: Non-industrial applications. {January
1984--March 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902702",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ICM,
author = "Anonymous",
title = "{IC} card with a microprocessor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902726",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gaglione:1988:SCT,
author = "A. M. Gaglione",
title = "Some complexity theory for cryptography",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--519",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902714",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCSb,
author = "Anonymous",
title = "Computer communications software. {January
1975--October 1986}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "519--520",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890274X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:CCSc,
author = "Anonymous",
title = "Computer communications software. {November
1986-September 1987}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "520--520",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902751",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:NCA,
author = "Anonymous",
title = "Neutral computers, auditing and security",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "520--520",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902763",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Byles:1988:LFD,
author = "Torrey Byles",
title = "``Look-and-feel'' decision looms",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--521",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902775",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goff:1988:HPC,
author = "Leslie Goff",
title = "{H-P} countersues {Apple}",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--521",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902817",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Grimm:1988:BRD,
author = "Vanessa Jo Grimm",
title = "Bill to regulate data matching moves to floor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--521",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902799",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jones:1988:MHP,
author = "Stephen Jones",
title = "{Microsoft}, {H-P} shrug off {Apple} suit",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--521",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902805",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parker:1988:IPC,
author = "Rachel Parker",
title = "Industry praises copyright decision",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--521",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902787",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Richman:1988:APR,
author = "Sheldon L. Richman",
title = "{Apple} property rights suit can backfire",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "521--522",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902829",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barker:1988:UCS,
author = "Paul Barker",
title = "{Unisys Canada} slaps \$500 K lawsuit on firm",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "522--522",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902830",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bridges:1988:CVS,
author = "Linda Bridges",
title = "Computer viruses strike colleges and companies,
leaving them defensive",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "522--522",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902866",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lewis:1988:CIB,
author = "Brenda D. Lewis",
title = "Copyright issue blurs",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "522--522",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902854",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Raab:1988:PCM,
author = "Selwyn Raab",
title = "Police chief of Metro-{North} indicted in computer
misuse",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "522--522",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902842",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SAC,
author = "Anonymous",
title = "Sabotage aimed at computer company destroys government
data",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "522--523",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888902878",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parker:1988:SML,
author = "Rachel Parker",
title = "Scent of money lures firms to jump on antiviral
bandwagon",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "523--523",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890288X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PO,
author = "Anonymous",
title = "Pages 438--530 ({October 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "5",
pages = "??--??",
month = oct,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:Ed,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "532--532",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900016",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:RBB,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "533--541",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900028",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stoll:1988:HSC,
author = "Cliff Stoll",
title = "How secure are computers in the {U.S.A.}?: an analysis
of a series of attacks on {Milnet} computers",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "543--547",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488890003X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1988:UPC,
author = "Belden Menkus",
title = "Understanding password compromise",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "549--552",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900041",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1988:SWC,
author = "Jack Bologna",
title = "{Soviet} white-collar crime and criminal justice",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "553--556",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:IBRf,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "557--558",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900065",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Eloff:1988:CSP,
author = "Jan H. P. Eloff",
title = "Computer security policy: Important issues",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "559--562",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900077",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carroll:1988:IMS,
author = "John M. Carroll",
title = "Implementing multilevel security by violation
privilege",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "563--573",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900089",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Biskup:1988:PMD,
author = "Joachim Biskup and Hans Hermann Br{\"u}ggeman",
title = "The personal model of data:: Towards a
privacy-oriented information system",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "575--597",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sandhu:1988:NCA,
author = "Ravinderpal Singh Sandhu",
title = "Nested categories for access control",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "599--605",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:ITCf,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "607--608",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900119",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1988:ARAb,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "609--615",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900120",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:Ce,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "616--616",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900132",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:AIV,
author = "Anonymous",
title = "Author index to volume 7",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "617--618",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900144",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:SIV,
author = "Anonymous",
title = "Subject index to volume 7",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "619--619",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404888900156",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1988:PD,
author = "Anonymous",
title = "Pages 532--619 ({December 1988})",
journal = j-COMPUT-SECUR,
volume = "7",
number = "6",
pages = "??--??",
month = dec,
year = "1988",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "2--2",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900291",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Ea,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "2--2",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900308",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBa,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "3--13",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990031X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moulton:1989:POP,
author = "Rolf Moulton and Robert P. Bigelow",
title = "Protecting ownership of proprietary information",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "15--21",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoffman:1989:RAC,
author = "Lance J. Hoffman",
title = "Risk analysis and computer security: Towards a theory
at last",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "23--24",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1989:LOC,
author = "Bernard P. Zajac",
title = "Legal options to computer viruses",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "25--27",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900345",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1989:OMF,
author = "Jack Bologna",
title = "The one minute fraud auditor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "29--31",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900357",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRa,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "33--34",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gleissner:1989:MTS,
author = "Winfried Gleissner",
title = "A mathematical theory for the spread of computer
viruses",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "35--41",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900370",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lunt:1989:ACP,
author = "Teresa F. Lunt",
title = "Access control policies: Some unanswered questions",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "43--54",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitchell:1989:RHF,
author = "Chris Mitchell and Dave Rush and Michael Walker",
title = "A remark on hash functions for message
authentication",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "55--58",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900394",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Feuerlicht:1989:RCI,
author = "J. Feuerlicht and P. Grattan",
title = "The role of classification of information in
controlling data proliferation in end-user personal
computer environment",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "59--66",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900400",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCa,
author = "Anonymous",
title = "{IFIP} Technical Committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "67--68",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:SAS,
author = "Anonymous",
title = "Special abstract: Study of computer ``viruses'' and
their potential for infecting {Commonwealth} computer
systems",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "69--71",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900424",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:WSa,
author = "Anonymous",
title = "What others are saying",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "72--73",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900436",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAa,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "74--82",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900448",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Ca,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "83--83",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990045X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PF,
author = "Anonymous",
title = "Pages 2--83 ({February 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "??--??",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Eb,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "86--86",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990059X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:LE,
author = "Anonymous",
title = "Letters to the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "87--90",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900606",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBb,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "91--100",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RV,
author = "Harold Joseph Highland",
title = "Reports from the victims",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "101--101",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990062X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Webster:1989:UDP,
author = "Anne E. Webster",
title = "{University} of {Delaware} and the {Pakistani}
computer virus",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "103--105",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900631",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanWyk:1989:LV,
author = "Kenneth R. van Wyk",
title = "The {Lehigh} virus",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "107--110",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900643",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Radai:1989:IPV,
author = "Yisrael Radai",
title = "The {Israeli PC} virus",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "111--113",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900655",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1989:CVS,
author = "Belden Menkus",
title = "The computer virus situation is not encouraging",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "115--119",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900667",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRb,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "121--122",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900679",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weber:1989:CEF,
author = "Ron Weber",
title = "Controls in electronic funds transfer systems: a
survey and synthesis",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "123--137",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900680",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kruys:1989:SOS,
author = "Jan P. Kruys",
title = "Security of open systems",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "139--147",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900692",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1989:MPD,
author = "Fred Cohen",
title = "Models of practical defenses against computer
viruses",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "149--160",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900709",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCb,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "161--162",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900710",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAb,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "163--172",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900722",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Cb,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "173--173",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900734",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PAa,
author = "Anonymous",
title = "Pages 86--173 ({April 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "2",
pages = "??--??",
month = apr,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Ec,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "176--177",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900990",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBc,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "178--188",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901004",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wood:1989:PMA,
author = "Charles Cresson Wood",
title = "Planning: a means to achieve data communications
security",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "189--199",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901016",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1989:PSS,
author = "Belden Menkus",
title = "Physical security: Selecting an access control
system",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "201--205",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901028",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRc,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "207--207",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990103X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shain:1989:SEF,
author = "M. Shain",
title = "Security in electronic funds transfer: Message
integrity in money transfer and bond settlements
through {GE} information services' global network",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "209--221",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901041",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Keenan:1989:EVO,
author = "Thomas P. Keenan",
title = "Emerging vulnerabilities in office automation
security",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "223--227",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thomsen:1989:PEM,
author = "D. J. Thomsen and W. T. Tsai and M. B.
Thuraisingham",
title = "Prototyping to explore {MLS\slash DBMS} design",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "229--245",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901065",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fifield:1989:SOC,
author = "Ken J. Fifield",
title = "{Smartcards} outsmart computer crime",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "247--255",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901077",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCc,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "257--258",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901089",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAc,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "259--269",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Cc,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "270--270",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889901107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PM,
author = "Anonymous",
title = "Pages 176--270 ({May 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "3",
pages = "??--??",
month = may,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Ed,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "272--273",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900850",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBd,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "274--282",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900862",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jamieson:1989:SCI,
author = "Rodger Jamieson and Graham Low",
title = "Security and control issues in local area network
design",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "283--290",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900874",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mollema:1989:PDC,
author = "Kor IJ. Mollema and Ad P. M. Smulders",
title = "Prerequisites for data control",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "291--296",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900886",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:1989:CAC,
author = "Fred Cohen",
title = "Computational aspects of computer viruses",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "297--298",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900898",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCd,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "299--302",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900904",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{White:1989:VWC,
author = "Clinton E. White",
title = "Viruses and worms: a campus under attack",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "303--303",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900916",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gardner:1989:IWW,
author = "Phillip E. Gardner",
title = "The {Internet} worm: What was said and when",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "305--316",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900928",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zajac:1989:DRY,
author = "Bernard P. Zajac",
title = "Disaster recovery --- are you really ready?",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "317--323",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990093X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hoffman:1989:SBA,
author = "Lance J. Hoffman",
title = "Smoking out the bad actors: Risk analysis in the age
of the microcomputer",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "325--344",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900941",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRd,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "345--346",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900953",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:WSb,
author = "Anonymous",
title = "What others are saying",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "347--352",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900965",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAd,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "353--361",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900977",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Cd,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "363--363",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900989",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PJ,
author = "Anonymous",
title = "Pages 272--363 ({June 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "4",
pages = "??--??",
month = jun,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Ee,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "366--367",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900163",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBe,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "369--380",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900175",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{DeMaio:1989:VMI,
author = "Harry B. DeMaio",
title = "Viruses --- a management issue",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "381--388",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900187",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1989:TRD,
author = "Belden Menkus",
title = "{It}'s time to rethink data processing fire
protection",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "389--394",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900199",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bologna:1989:TTR,
author = "G. J. Bologna",
title = "Twenty-two reasons why {MIS} subordinates don't
measure up to their bosses' expectations",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "395--396",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900205",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRe,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "397--397",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900217",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Burk:1989:DPS,
author = "Holger B{\"u}rk and Andreas Pfitzmann",
title = "Digital payment systems enabling security and
unobservability",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "399--416",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900229",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Boshoff:1989:PCM,
author = "W. H. Boshoff and S. H. von Solms",
title = "A path context model for addressing security in
potentially non-secure environments",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "417--425",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900230",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wiseman:1989:PVC,
author = "Simon Wiseman",
title = "Preventing viruses in computer systems",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "427--432",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Badenhorst:1989:FML,
author = "K. P. Badenhorst and Jan H. P. Eloff",
title = "Framework of a methodology for the life cycle of
computer security in an organization",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "433--442",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900254",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCe,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "443--444",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900266",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAe,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "445--455",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900278",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Ce,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "456--456",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990028X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PAb,
author = "Anonymous",
title = "Pages 366--456 ({August 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "5",
pages = "??--??",
month = aug,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highlands:1989:E,
author = "Harold Joseph Highlands",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "458--459",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900746",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBf,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "460--478",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900758",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gardner:1989:EFR,
author = "Phillip E. Gardner",
title = "Evaluation of five risk assessment programs",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "479--485",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990076X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1989:ERP,
author = "Belden Menkus",
title = "The employee's role in protecting information assets",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "487--492",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900771",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRf,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "493--493",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900783",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Harrold:1989:ISA,
author = "C. L. Harrold",
title = "An introduction to the {SMITE} approach to secure
computing",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "495--505",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900795",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaswamy:1989:PDI,
author = "Raju Ramaswamy",
title = "Placement of data integrity security services in open
systems interconnection architecture",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "507--516",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900801",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Keefe:1989:SSO,
author = "T. F. Keefe and W. T. Tsai and M. B. Thuraisingham",
title = "{SODA}: a secure object-oriented database system",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "517--533",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900813",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCf,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "535--536",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900825",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:ARAf,
author = "Esther H. Highland",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "537--546",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900837",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Cf,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "547--548",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900849",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PO,
author = "Anonymous",
title = "Pages 458--548 ({October 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "6",
pages = "??--??",
month = oct,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:E,
author = "Anonymous",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "550--552",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900461",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBg,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "553--561",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:SDI,
author = "Harold Joseph Highland",
title = "Secret disk {II} --- administrator",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "563--568",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Riddle:1989:PUU,
author = "Bruce L. Riddle and Murray S. Miron and Judith A.
Semo",
title = "Passwords in use in a university timesharing
environment",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "569--579",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menkus:1989:CRF,
author = "Belden Menkus",
title = "Computer-related fire problems revisited",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "581--586",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jobusch:1989:SPMa,
author = "David L. Jobusch and Arthur E. Oldehoeft",
title = "A survey of password mechanisms: Weaknesses and
potential {improvements.Part 1}",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "587--604",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRg,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "605--605",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dehnad:1989:SWI,
author = "Khosrow Dehnad",
title = "A simple way of improving the login security",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "607--611",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900539",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pfleeger:1989:MPT,
author = "Charles P. Pfleeger and Shari Lawrence Pfleeger and
Mary Frances Theofanos",
title = "A methodology for penetration testing",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "613--620",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900540",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bong:1989:OSI,
author = "Dieter Bong and Christoph Ruland",
title = "Optimized software implementations of the modular
exponentiation on general purpose microprocessors",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "621--630",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCg,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "631--632",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ARAa,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "633--640",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900576",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Cg,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "641--642",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900588",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PN,
author = "Anonymous",
title = "Pages 550--642 ({November 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "7",
pages = "??--??",
month = nov,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:Ef,
author = "Harold Joseph Highland",
title = "From the editor",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "644--646",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900011",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:RBBh,
author = "Harold Joseph Highland",
title = "Random bits and bytes",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "647--657",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900023",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:DVN,
author = "Harold Joseph Highland",
title = "Datacrime virus and new anti-virus products",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "659--661",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900035",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Preston:1989:RV,
author = "Charles M. Preston",
title = "Review of {VIRUSCAN}",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "663--668",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Highland:1989:VVS,
author = "Harold Joseph Highland",
title = "{VCHECKER} --- a virus search program",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "669--674",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900059",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jobusch:1989:SPMb,
author = "David L. Jobusch and Arthur E. Oldehoeft",
title = "A survey of password mechanisms: Weaknesses and
potential {improvements.Part 2}",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "675--689",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:IBRh,
author = "Anonymous",
title = "International board of referees",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "691--691",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Varadharajan:1989:VNS,
author = "Vijay Varadharajan",
title = "Verification of network security protocols",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "693--708",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900084",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaswamy:1989:SAD,
author = "Raju Ramaswamy",
title = "Security architecture for data transfer through
{TCP\slash IP} protocols",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "709--720",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900096",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thuraisingham:1989:FVM,
author = "M. B. Thuraisingham",
title = "A functional view of multilevel databases",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "721--730",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900102",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ITCh,
author = "Anonymous",
title = "{IFIP} technical committee 11",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "731--732",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900114",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:ARAb,
author = "Anonymous",
title = "Abstracts of recent articles and literature",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "733--739",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900126",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:Ch,
author = "Anonymous",
title = "Calendar",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "741--741",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900138",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:AI,
author = "Anonymous",
title = "Author index",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "743--743",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/016740488990014X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:SI,
author = "Anonymous",
title = "Subject index",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "745--749",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
URL = "https://www.sciencedirect.com/science/article/pii/0167404889900151",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:1989:PD,
author = "Anonymous",
title = "Pages 644--749 ({December 1989})",
journal = j-COMPUT-SECUR,
volume = "8",
number = "8",
pages = "??--??",
month = dec,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:44:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}