ebook img

Computers & Security 1996: Vol 15 Index PDF

8 Pages·1996·2.8 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computers & Security 1996: Vol 15 Index

Computers & Security, 16 (1997) 165-171 Subject Index for Volume 15 Abilene Paradox BS7790 GSSP (Generally-Accepted System Security GSSP (Generally-Accepted System Security Principles): a trip to Abilene 567 Principles): a trip to Abilene 567 Access control an access control scheme based on Chinese CD-ROM remainder theorem and time stamp concept information protection for publishers 209 73 China enforcing legal ownership rights by an access computer security in China 369 control system 212 Chinese remainder theorem object oriented cryptographic facility design: an access control scheme based on Chinese export considerations 507 remainder theorem and time stamp concept 73 security classification for documents 55 Civil rights the information security chain in a company 297 enforcing legal ownership rights by an access the spook solution - now open for business 17 control system 212 Addresses Client servers plugging the holes in host-based authentication the role of information security in corporate 661 governance 477 Attacks using RAD tools to develop secure client/server a note on distributed coordinated attacks 103 applications 289 Audit trail analysis COBIT Cooperating Security Managers: distributed GSSP (Generally-Accepted System Security intrusion detection systems 441 Principles): a trip to Abilene 567 Authentication COCOM a simple scheme to make passwords based on cryptographic controls - the eternal triangle 576 one-way functions much harder to crack 171 Code of Practice authenticating passwords over an insecure information security management: the second channel 431 generation 281 plugging the holes in host-based authentication Communications 661 electronic communications risk management: a quantitative authentication and vouching 633 checklist for business managers 377 smart card based secure password authentication the information security chain ina company 297 scheme 231 Complexity quantitative authentication and vouching 633 Ballot’s confidentiality Computer crime a conventional approach to secret balloting in IT security in Dutch practice 157 computer networks 249 Computer networks. See Local area networks (LANs); Networks 0167-4048/97/$17.00 © 1997, Elsevier Science Ltd Subject Index Computer security. See Security year 2000 - a real IS security issue 499 Confidentiality Distributed coordinated attacks (DCA) electronic communications risk management: a a note on distributed coordinated attacks 103 checklist for business managers 377 Distributed systems Conspiracy attack a collision-free secret ballot protocol for cryptanalysis and repair of the multiverifier computerized general elections 339 signature with verifier specification 537 open for business - securely 673 Contingency planning quantitative authentication and vouching 633 establishing a network security programme 486 the information security chain in a company 297 the information security chain in a company 297 Document security Copyright security classification for documents 55 enforcing legal ownership rights by an access Dynamic control system 212 an access control scheme based on Chinese establishing Web sites - legal issues and risks 198 remainder theorem and time stamp concept 73 Corporate governance the role of information security in corporate EDI governance 477 message encipherment with minimal expansion Costs and redundancy - doing better than ISO-10126 open for business - securely 673 627 Countermeasures EDIFACT IT security in Dutch practice 157 message encipherment with minimal expansion Criminal rights and redundancy - doing better than ISO-10126 627 enforcing legal ownership rights by an access control system 212 Electricity supply Cryptography. See Encryption the information security chain in a company 297 Electromagnetic interference the information security chain in a company 297 Data communication networks Electronic data interchange (EDI) message encipherment with minimal expansion and redundancy - doing security issues in the virtual corporation 471 better than ISO-10126 627 Electronic mail (e-mail) Data security a probabilistic flaw in PGP design 39 GOST 34.10 - a brief overview of Russia’s DSA electronic communications risk management: a 725 checklist for business managers 377 Defamation Electronic voting establishing Web sites - legal issues and risks 198 a conventional approach to secret balloting in Digital signature computer networks 249 an implementable secure voting scheme 327 a conventional approach to secret balloting in computer networks 249 E-mail. See Electronic mail (e-mail) cryptanalysis and repair of the multiverifier Emergency signature with verifier specification 537 the information security chain in a company 297 GOST 34.10 - a brief overview of Russia’s DSA Encryption 725 a confidentiality system for ISDN inter-PC Disaster recovery high-speed file transfer 141 establishing a network security programme 486 Computers & Security, Vol. 16, No. 2 a conventional approach to secret balloting in Fuzzy logic computer networks 249 risk analysis modelling with the use of fuzzy logic a probabilistic flaw in PGP design 39, 39 239 a simple scheme to make passwords based on one-way functions much harder to crack 171 Group decision support systems achieving interoperable security services in open a conventional approach to secret balloting in systems products 27 computer networks 249 cryptanalysis and repair of the multiverifier Group-oriented scheme signature with verifier specification 537 cryptanalysis and repair of the multiverifier cryptographic controls - the eternal triangle 576 signature with verifier specification 537 GOST 34.10 - a brief overview of Russia’s DSA GSSP (Generally-Accepted System Security 725 Principles) message encipherment with minimal expansion GSSP (Generally-Accepted System Security and redundancy - doing better than ISO-10126 Principles): a trip to Abilene 567 627 object oriented cryptographic facility design: Hacking export considerations 507 electronic communications risk management: a open for business - securely 673 checklist for business managers 377 plugging the holes in host-based authentication Hash function 661 GOST 34.10 - a brief overview of Russia’s DSA the information security chain in a company 297 725 Espionage Hypertext the information security chain in a company 297 a security officer’s workbench 695 Exports cryptographic controls - the eternal triangle 576 Imports object oriented cryptographic facility design: cryptographic controls - the eternal triangle 576 export considerations 507 Information security plugging the holes in host-based authentication 661 information protection for publishers 209 information security management: the second generation 281 File transfer IT security in Dutch practice 157 a confidentiality system for ISDN inter-PC high-speed file transfer 141 risk analysis modelling with the use of fuzzy logic 239 Filtering the information security chain in a company 297 message encipherment with minimal expansion the role of information security in corporate and redundancy - doing better than ISO-10126 governance 477 627 Financial services Information warfare establishing Web sites - legal issues and risks 198 information warfare - your company needs you 561 Fire Intellectual property the information security chain in a company 297 establishing Web sites - legal issues and risks 198 Forgery Internet cryptanalysis and repair of the multiverifier electronic communications risk management: a signature with verifier specification 537 checklist for business managers 377 establishing Web sites - legal issues and risks 198 167 Subject Index Internet as a pornotopia 203 Locks message encipherment with minimal expansion the information security chain in a company 297 and redundancy - doing better than ISO-10126 627 Management open for business - securely 673 information security management: the second the role of information security in corporate generation 281 governance 477 Medical records Intranet medical records security 100 the role of information security in corporate Message encipherment governance 477 message encipherment with minimal expansion Intrusion detection and redundancy - doing better than ISO-10126 Cooperating Security Managers: distributed 627 intrusion detection systems 441 Mobile computing IPsec the information security chain in a company 297 plugging the holes in host-based authentication Networks 661 a conventional approach to secret balloting in ISDN computer networks 249 a confidentiality system for ISDN inter-PC Cooperating Security Managers: distributed high-speed file transfer 141 intrusion detection systems 441 ISO 9000 establishing a network security programme 486 information security management: the second message encipherment with minimal expansion generation 281 and redundancy - doing better than ISO-10126 627 Key distribution plugging the holes in host-based authentication a confidentiality system for ISDN inter-PC 661 high-speed file transfer 141 using RAD tools to develop secure client/server Key escrow applications 289 cryptographic controls - the eternal triangle 576 object oriented cryptographic facility design: Object classification export considerations 507 security classification for documents 55 Key-lock-pair Object orientation an access control scheme based on Chinese object oriented cryptographic facility design: remainder theorem and time stamp concept 73 export considerations 507 Key management OECD a confidentiality system for ISDN inter-PC GSSP (Generally-Accepted System Security high-speed file transfer 141 Principles): a trip to Abilene 567 One-way function Legal issues a simple scheme to make passwords based on enforcing legal ownership rights by an access one-way functions much harder to crack 171 control system 212 authenticating passwords over an insecure establishing Web sites - legal issues and risks 198 channel 431 year 2000 - a real IS security issue 499 Open systems Local area networks (LANs) achieving interoperable security services in open an implementable secure voting scheme 327 systems products 27 the new face of the virus threat 13 open for business - securely 673 Computers & Security, Vol. 16, No. 2 Ownership rights the information security chain in a company 297 enforcing legal ownership rights by an access Pseudo-random number generators (PRNG) control system 212 a probabilistic flaw in PGP design 39 Public key systems Passwords a probabilistic flaw in PGP design 39 a simple scheme to make passwords based on achieving interoperable security services in open one-way functions much harder to crack 171 systems products 27 authenticating passwords over an insecure open for business - securely 673 channel 431 smart card based secure password authentication plugging the holes in host-based authentication scheme 231 661 Publishers smart card based secure password authentication information protection for publishers 209 scheme 231 the information security chain in a company 297 RAD (rapid application development) environments Personal computers using RAD tools to develop secure client/server a confidentiality system for ISDN inter-PC applications 289 high-speed file transfer 141 RDBMS Personnel using RAD tools to develop secure client/server the information security chain in a company 297 applications 289 PGP Recovery a probabilistic flaw in PGP design 39 the information security chain in a company 297 Politics Regulations plugging the holes in host-based authentication computer security in China 369 661 Rescue quantitative authentication and vouching 633 the information security chain in a company 297 Pornography Revocation Internet as a pornotopia 203 extending the Schematic Protection Model -JJ. Portability Revocation 525 object oriented cryptographic facility design: Risk analysis export considerations 507 a security officer’s workbench 695 Privacy risk analysis modelling with the use of fuzzy logic a collision-free secret ballot protocol for 239 computerized general elections 339 Risk Data Repository a confidentiality system for ISDN inter-PC a security officer’s workbench 695 high-speed file transfer 141 Risk management electronic communications risk management: a electronic communications risk management: a checklist for business managers 377 checklist for business managers 377 Private key systems establishing a network security programme 486 achieving interoperable security services in open Risk model systems products 27 a security officer’s workbench 695 Protection Risks extending the Schematic Protection Model -II. Revocation 525 establishing Web sites - legal issues and risks 198 information protection for publishers 209 the information security chain in a company 297 IT security in Dutch practice 157 Subject Index Russia see also Information security GOST 34.10 - a brief overview of Russia’s DSA Self-evaluation 725 information security management: the second generation 281 Sabotage Signature the information security chain in a company 297 smart card based secure password authentication Safety scheme 231 Smart cards extending the Schematic Protection Model -II. Revocation 525 authenticating passwords over an insecure channel 431 SALSA smart card based secure password authentication SALSA: a method for developing the enterprise scheme 231 security architecture and strategy 501 Social acceptance Schematic Protection Model (SPM) a conventional approach to secret balloting in extending the Schematic Protection Model -II. computer networks 249 Revocation 525 SOS TDP Secret ballot protocols achieving interoperable security services in open a collision-free secret ballot protocol for systems products 27 computerized general elections 339 Secret sharing schemes Spoofing cryptanalysis and repair of the multiverifier an implementable secure voting scheme 327 signature with verifier specification 537 Security SQL a collision-free secret ballot protocol for using RAD tools to develop secure client/server computerized general elections 339 applications 289 a confidentiality system for ISDN inter-PC high-speed file transfer 141 SSH plugging the holes in host-based authentication a security officer’s workbench 695 661 a simple scheme to make passwords based on one-way functions much harder to crack 171 SSL (Secure Sockets Layer) achieving interoperable security services in open plugging the holes in host-based authentication systems products 27 661 an implementable secure voting scheme 327 Standards computer security in China 369 achieving interoperable security services in open systems products 27 establishing a network security programme 486 GOST 34.10 - a brief overview of Russia’s DSA GSSP (Generally-Accepted System Security 725 Principles): a trip to Abilene 567 GSSP (Generally-Accepted System Security medical records security 100 Principles): a trip to Abilene 567 open for business - securely 673 information security management: the second SALSA: a method for developing the enterprise generation 281 security architecture and strategy 501 Strategy security issues in the virtual corporation 471 SALSA: a method for developing the enterprise the information security chain in a company 297 security architecture and strategy 501 the role of information security in corporate governance 477 Theft the spook solution - now open for business 17 the information security chain in a company 297 year 2000 - a real IS security issue 499 Computers & Security, Vol. 16, No. 2 Threats Virtual corporation IT security in Dutch practice 157 security issues in the virtual corporation 471 open for business - securely 673 Virtual Private Networking (VPN) the information security chain in a company 297 open for business - securely 673 Time stamp Viruses an access control scheme based on Chinese the information security chain in a company 297 remainder theorem and time stamp concept 73 the new face of the virus threat 13 Tools Vouching a security officer’s workbench 695 quantitative authentication and vouching 633 Uniquely blind signature schemes Water damage a collision-free secret ballot protocol for the information security chain in a company 297 computerized general elections 339 Web sites United State establishing Web sites - legal issues and risks 198 plugging the holes in host-based authentication 661 XDSF User IDs open for business - securely 673 plugging the holes in host-based authentication 661 Year 2000 year 2000 - a real IS security issue 499 Verification cryptanalysis and repair of the multiverifier signature with verifier specification 537 Computers & Security, 16 (1997) 172 Author Index for Volume 15 Adams, D., 673 Kovacich, G., 486 Sherwood,J. , 501 Anderson, M., 633 Krull, A., 567 Smith, P, 27 Kwok, L.F., 695 Spruit, M., 157 Blatchford, C., 203 Sung, H-S., 431 Bontchey, V., 595 Lei, C-L., 339 Teufel, S., 55 Born, E., 212 Lemieux,J. , 289 Tzeng, W-G., 73 Borrell,J. , 327 Lindup, K., 477 Buckwell, M., 17 Longley, D., 695 van der Vlist, P, 627 Looyen, M., 157 Varadharajan, V., 525 Calvelli, C., 525 von Solms R., 281 Chang, J-F., 231 Manber, U., 171 Clark, A., 576 Matsumoto, H., 141 Wang, S-J., 231 Cohen, F.B., 103, 707 Michels, M., 725 White, G., 441 Miller N., 198 Wu, T-C., 431 David,J. , 13 Moreau, T., 39 de Ru., W.G., 239 Moulton, M.E., 377 Yang, W-P,, 73 Moulton, R.T., 377 Yen, S-M., 537 Eloff, J.H.P.,, 55, 239 Yesberg,J. , 633 Evans, P, 209 Naccache, D., 725 Finne, T., 297 Oyaizu, I., 141 Frank, B., 471 Petersen, H., 725 Heinlein, E.B., 100, 369, 499 Porter, T., 561 Holbein, R., 55 Press,J. , 507 Hwang, J-]., 249 Hwang, M-S., 73 Reid,J. , 661 Rifa,J. ,3 27 Jansen, C., 627 Juang, W-S., 339

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.