Last update: Sat Jan 6 02:03:49 MST 2018
@Article{Marshall:1980:CS,
author = "G. Marshall",
title = "Computer Security",
journal = j-COMP-J,
volume = "23",
number = "3",
pages = "261--261",
month = aug,
year = "1980",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/23.3.261",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:08 MST 2012",
bibsource = "http://comjnl.oxfordjournals.org/content/23/3.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib",
URL = "http://comjnl.oxfordjournals.org/content/23/3/261.full.pdf+html",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}