Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.00",
%%%     date            = "23 September 2019",
%%%     time            = "11:29:18 MDT",
%%%     filename        = "computsecur1980.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "02981 21403 74183 816040",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 1980--1989.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            http://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.00, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1982 (  56)    1985 (  60)    1988 ( 457)
%%%                             1983 (  63)    1986 ( 104)    1989 ( 118)
%%%                             1984 (  65)    1987 ( 115)
%%%
%%%                             Article:       1038
%%%
%%%                             Total entries: 1038
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Highland:1982:Ea,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900189",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:IBE,
  author =       "Anonymous",
  title =        "International board of editors",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "3--8",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900190",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fordyce:1982:CSC,
  author =       "Samantha Fordyce",
  title =        "Computer security: a current assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "9--16",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900207",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Perry:1982:DCS,
  author =       "William E. Perry",
  title =        "Developing a computer security and control strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "17--26",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900219",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guillou:1982:CT,
  author =       "L. C. Guillou and B. Lorig",
  title =        "Cryptography and teleinformatics",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "27--33",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Friedman:1982:CDP,
  author =       "Stanley Friedman",
  title =        "Contingency and disaster planning",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "34--40",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{BloomBecker:1982:ICC,
  author =       "Jay BloomBecker",
  title =        "International computer crime: Where terrorism and
                 transborder data flow meet",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "41--53",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900244",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Porter:1982:PEI,
  author =       "Sigmund N. Porter",
  title =        "A password extension for improved human factors",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "54--56",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kurzban:1982:SBA,
  author =       "Stanley A. Kurzban",
  title =        "A selective, briefly annotated bibliography of works
                 on data security and privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "57--64",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900268",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1982:FAC,
  author =       "Charles Cresson Wood",
  title =        "Future applications of cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "65--71",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290027X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1982:TPK,
  author =       "Michael Willett",
  title =        "A tutorial on public key cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "72--79",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Henry:1982:FDA,
  author =       "Paul S. Henry",
  title =        "Fast decryption algorithm for the knapsack cipher",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "80--83",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:BRCa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Cryptography: a primer}}:
                 Alan G. Konheim: New York: John Wiley and Sons,
                 1981. xiv + 432 pp. \$34.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290030X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:BRCb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Computer control and
                 security: a guide for managers and systems analysts}}:
                 William E. Perry: New York: John Wiley and Sons,
                 1981. xiii + 207 pp. \$22.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "85--85",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900311",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:CLA,
  author =       "Anonymous",
  title =        "Current literature: Abstracts of recent articles and
                 literature",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "86--91",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900323",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "92--94",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900335",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "ifc--ifc",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900177",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:PJa,
  author =       "Anonymous",
  title =        "Pages 1--94 ({January 1982})",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:Eb,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "95--95",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:NMI,
  author =       "Anonymous",
  title =        "New members of the international board of editors",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "97--98",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Courtney:1982:SAD,
  author =       "Robert H. Courtney",
  title =        "A systematic approach to data security",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "99--112",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blom:1982:SMD,
  author =       "Rolf Blom and Jan-Olof Br{\"u}er and Viiveke F{\aa}k
                 and S. Ingvar {\AA}kersten",
  title =        "On security measures in distributed computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "113--122",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1982:CCB,
  author =       "John M. Carroll",
  title =        "The control of computer-based fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "123--138",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1982:PDC,
  author =       "Charles Cresson Wood",
  title =        "Policies for deterring computer abuse",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "139--145",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1982:MAI,
  author =       "Rolf Moulton",
  title =        "A multidisciplinary approach to the investigation of
                 computer abuse incidents",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "146--151",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Neugent:1982:TCS,
  author =       "William Neugent",
  title =        "Teaching computer security: a course outline",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "152--163",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:GNC,
  author =       "Esther Harris Highland and Harold Joseph Highland",
  title =        "A guide to {NBS} computer security literature",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "164--176",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1982:CON,
  author =       "Michael Willett",
  title =        "Cryptography old and new",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "177--186",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:POC,
  author =       "Anonymous",
  title =        "Professional organizations in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "187--190",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:BRMa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Managing information
                 security: a program for the electronic information
                 age}}: James A. Schweitzer Boston: Butterworth
                 (Publishers), Inc., 1982. vi + 133 pp. \$15.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "191--191",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:BRMb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Management guide to computer
                 security}}: J. R. Talbot, New York: John Wiley and
                 Sons, 1981. xi + 180 pp. \$29.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "191--192",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290013X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:SSS,
  author =       "Esther H. Highland",
  title =        "{System security standard for electronic data
                 processing: Rolf Moulton New York: the city of New
                 York, 1981. \$7.50}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "192--192",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900141",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "193--199",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "200--200",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900165",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:PJb,
  author =       "Anonymous",
  title =        "Pages 95--200 ({June 1982})",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murray:1982:SPP,
  author =       "William Hugh Murray",
  title =        "Security procedures for program libraries",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "201--209",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900347",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shaw:1982:EGA,
  author =       "James K. Shaw and Stuart W. Katzke",
  title =        "An executive guide to {ADP} contingency planning",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "210--215",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900359",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ball:1982:DRS,
  author =       "Leslie D. Ball and Gail Dentch and Mary Emerson and
                 Martha Lewis and Susan McWhorter and Frank Turgeon",
  title =        "Disaster recovery services",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "216--225",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/0167-4048(82)90036-0",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900360",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Linden:1982:SEM,
  author =       "Christer Lind{\'e}n and Hans Block",
  title =        "Sealing electronic money in {Sweden}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "226--230",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900372",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reed:1982:RTY,
  author =       "Susan K. Reed and Dennis K. Branstad",
  title =        "Reflections on ten years of computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "231--232",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900384",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:EGC,
  author =       "Anonymous",
  title =        "Executive guide to computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "233--241",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900396",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1982:EN,
  author =       "Harold Joseph Highland",
  title =        "{Editor}'s note",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "242--242",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900402",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1982:GE,
  author =       "Michael Willett",
  title =        "Guest editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "243--244",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900414",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kahn:1982:GLC,
  author =       "David Kahn",
  title =        "The grand lines of cryptology's development",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "245--248",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buck:1982:PCS,
  author =       "R. Creighton Buck",
  title =        "The public cryptography study group",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "249--254",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900438",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Branstad:1982:ISS,
  author =       "Dennis K. Branstad and Miles E. Smid",
  title =        "Integrity and security standards based on
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "255--260",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290044X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Banerjee:1982:HSI,
  author =       "Subodh K. Banerjee",
  title =        "High speed implementation of {DES}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "261--267",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900451",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schanning:1982:APK,
  author =       "Brian P. Schanning",
  title =        "Applying public key distribution to local area
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "268--274",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900463",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jayant:1982:ASS,
  author =       "N. S. Jayant",
  title =        "Analog scramblers for speech privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "275--289",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900475",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{RFB:1982:BRMa,
  author =       "RFB",
  title =        "Book Review: {{\booktitle{Management guide to computer
                 security}}: J. P. Talbot, New York: John Wiley and
                 Sons, 1981. xi + 180 pp. \$29.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "290--291",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900487",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{RFB:1982:BRMb,
  author =       "RFB",
  title =        "Book Review: {{\booktitle{Multi-national computer
                 systems: an introduction to transnational data flow and
                 data regulation}}: Harry S. Katzan, Jr.: New York: Van
                 Nostrand Reinhold Co., 1980. xii + 198 pp. \$16.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "291--292",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900499",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "293--297",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900505",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "298--298",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900517",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 1",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "299--302",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900529",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 1",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "303--304",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900530",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1982:PN,
  author =       "Anonymous",
  title =        "Pages 201--304 ({November 1982})",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "??--??",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:Ea,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900263",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:TNM,
  author =       "Anonymous",
  title =        "Three new members of the International Board of
                 {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "3--4",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1983:EISa,
  author =       "Charles Cresson Wood",
  title =        "Effective information system security with password
                 controls",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "5--10",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1983:NTD,
  author =       "Belden Menkus",
  title =        "Notes on terrorism and data processing",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "11--15",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900299",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murray:1983:CSO,
  author =       "William H. Murray",
  title =        "Computer security: Observations on the state of the
                 technology",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "16--23",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900305",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caroll:1983:MSA,
  author =       "John M. Caroll and Oi-Lun Wu",
  title =        "Methodology for security analysis of data-processing
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "24--34",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900317",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Backwith:1983:UAS,
  author =       "Nigel Backwith",
  title =        "Unique approach to security evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "35--40",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Weingarten:1983:CCP,
  author =       "F. Weingarten",
  title =        "Controlling cryptographic publication",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "41--48",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bussolati:1983:TNA,
  author =       "U. Bussolati and G. Martella",
  title =        "Towards a new approach to secure database design",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "49--62",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900342",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goldstein:1983:CCP,
  author =       "Bruce Goldstein",
  title =        "Computer crime and its prevention",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "63--66",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cerullo:1983:DCC,
  author =       "Michael J. Cerullo",
  title =        "Data communications controls",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "67--72",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guynes:1983:EIC,
  author =       "Steve Guynes",
  title =        "{EFTS} impact on computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "73--77",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900378",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Callaghan:1983:SDW,
  author =       "David R. Callaghan",
  title =        "Securing the distributed word processing network",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "78--81",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390038X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:BRH,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{The hut six story: Breaking
                 the Enigma codes}}: Gordon Welchman: London: Allen Lane
                 (Penguin Books, Ltd) and New York: McGraw Hill Book
                 Co., Inc., 1982. $x$ + 326 pp., \$12.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "82--83",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:BRCa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{CBEMA privacy and security
                 bibliography (October 1982)}}: Rein Turn, editor:
                 Washington DC: Computer and Business Equipment
                 Manufacturers Association, 1982, iii + 51 pp.}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "83--83",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900408",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:BRCb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Codes, ciphers and
                 computers: an introduction to information security}}:
                 Bruce Bosworth: Rochelle Park NJ: Hayden Book Company,
                 Inc., 1982. viii + 259 pp., \$13.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "83--84",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390041X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:BRA,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Advances in computer system
                 security}}: Rein Turn, editor: Dedham MA: Artech House,
                 Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences,
                 PO Box 181, Wellesley, MA 02181, USA) \$29.50}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900421",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:BRT,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Tutorial: the security of
                 data in networks}}: Donald W. Davies: Silver Spring MD:
                 IEEE Computer Society, 1981. vi + 241 pp., \$20.00 to
                 non-members and \$15.00 to members of IEEE}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900433",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:OTA,
  author =       "Anonymous",
  title =        "The {Office} of Technology Assessment reports",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "85--87",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900445",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "88--96",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "97--98",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900469",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "ifc--ifc",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900251",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:PJa,
  author =       "Anonymous",
  title =        "Pages 1--98 ({January 1983})",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:IS,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec '83}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "99--101",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bound:1983:MRA,
  author =       "William A. J. Bound and Dennis R. Ruth",
  title =        "Making risk analysis a useful management tool with
                 microcomputer electronic worksheet packages",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "102--115",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900482",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beckman:1983:IFS,
  author =       "Kristian Beckman",
  title =        "{IFIP}'s first security congress: the multi-million
                 step",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "117--119",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900494",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:ISI,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec '83} --- {IFIP}'s First Security
                 Conference",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "120--131",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900500",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Warren:1983:ERC,
  author =       "Andrew D. Warren",
  title =        "Evaluating the risks of computer fraud and error",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "132--143",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900512",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1983:SSV,
  author =       "Ronal Paans and Guus Bonnes",
  title =        "Surreptitious security violation in the {MVS}
                 operating system",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "144--152",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900524",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bonyun:1983:UAP,
  author =       "David A. Bonyun",
  title =        "The use of architectural principles in the design of
                 certifiably secure systems",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "153--162",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900536",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoving:1983:IAC,
  author =       "Per L. Hoving",
  title =        "To install an Access Control System, activities and
                 checklists",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "163--170",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900548",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:IMT,
  author =       "Harold Joseph Highland",
  title =        "Impact of microcomputers on total computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "171--183",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390055X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:POCa,
  author =       "Anonymous",
  title =        "Professional organizations in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "184--185",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900561",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:CCB,
  author =       "Anonymous",
  title =        "Computer crime: {Bureau of Justice Statistics, U.S.
                 Department of Justice}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "186--188",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900573",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:CST,
  author =       "Esther H. Highland",
  title =        "Computer Security Techniques: List of controls by
                 cost",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "189--193",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900585",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "194--205",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900597",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "206--211",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900603",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:PJb,
  author =       "Anonymous",
  title =        "Pages 99--211 ({June 1983})",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1983:Eb,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "213--213",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:NMI,
  author =       "Anonymous",
  title =        "New members of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "214--217",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lobel:1983:SAC,
  author =       "Jerome Lobel",
  title =        "The state-of-the-art in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "218--222",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1983:EISb,
  author =       "Charles Cresson Wood",
  title =        "Enhancing information security with the information
                 resource management approach",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "223--229",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1983:DSR,
  author =       "John M. Carroll",
  title =        "Decision support for risk analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "230--236",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fry:1983:CME,
  author =       "Brian G. P. Fry and William F. Main",
  title =        "A conceptual methodology for evaluating security
                 requirements for data assets",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "237--241",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Koch:1983:IIT,
  author =       "Harvey S. Koch",
  title =        "Implementing an integrated test facility audit using
                 differential files",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "242--247",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390007X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hartson:1983:TPC,
  author =       "H. Rex Hartson",
  title =        "Teaching protection in computing: a research-oriented
                 graduate course",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "248--255",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:1983:SPS,
  author =       "Jan H. P. Eloff",
  title =        "Selection process for security packages",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "256--260",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ayoub:1983:DCE,
  author =       "F. Ayoub",
  title =        "The design of complete encryption networks using
                 cryptographically equivalent permutations",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "261--267",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390010X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sorkin:1983:RST,
  author =       "Arthur Sorkin",
  title =        "Requirements for a secure terminal switch",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "268--274",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bottom:1983:ITS,
  author =       "Norman R. Bottom",
  title =        "An informational theory of security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "275--280",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:NIT,
  author =       "Anonymous",
  title =        "News from {IFIP TC-11}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "281--282",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:POCb,
  author =       "Anonymous",
  title =        "Professional organizations in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "283--285",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "286--296",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRSa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Security, IFIP\slash sec
                 '83}}: Viiveke F{\aa}k, Editor: Proceedings of the
                 first conference, Stockholm, Sweden, 16--19 May
                 1983. Amsterdam: North-Holland, 1983. xxxvi + 328
                 pp.\$39.00 (in United States and Canada). Dfl. 95.00
                 (rest of the world)}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "297--298",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRPa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Protecting your
                 microcomputer system}}: Harold Joseph Highland: New
                 York: John Wiley and Sons, Inc., 1984. xxii + 244
                 pp. \$14.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "298--298",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRN,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Nine steps to effective EDP
                 loss control}}: Tom S. Eason and Douglass A. Webb:
                 Bedford, MA: Digital Press, Digital Equipment Company,
                 1982. xi + 177 pp.}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "299--299",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRPb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Protecting information in
                 the electronic workplace: a guide for managers}}: James
                 A. Schweitzer: Reston VA: Reston Publishing Company,
                 Inc., 1983. xiv + 146 pp. \$19.95 (hardbound) and
                 \$14.95 (paperback)}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "299--299",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900184",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRC,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Computer security: an
                 overview of national concern and challenge}}: Louise G.
                 Becker: Washington DC: Library of Congress, 1983. xiv +
                 241 pp.}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "299--300",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900202",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:BRSb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Security manual}}: Eric
                 Oliver and John Wilson: [Fourth edition]. Brookfield
                 VT: Gower Publishing Co., 1983. xiv + 228
                 pp. \$12.50}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "300--300",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "301--304",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900226",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 2",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "305--308",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 2",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "309--309",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390024X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1983:PN,
  author =       "Anonymous",
  title =        "Pages 213--309 ({November 1983})",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "??--??",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:E,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900191",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1984:DSM,
  author =       "Rolf Moulton",
  title =        "Data security is a management responsibility",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "3--7",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900208",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Koch:1984:ALS,
  author =       "Harvey S. Koch",
  title =        "Auditing on-line systems: an evaluation of parallel
                 versus Continuous and Intermittent Simulation",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "9--19",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490021X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schweitzer:1984:PWA,
  author =       "James A. Schweitzer",
  title =        "Personal workstation automation security
                 vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "21--28",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900221",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seif:1984:CPB,
  author =       "Ruth A. Seif",
  title =        "Contingency planning in the banking community",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "29--34",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900233",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oldehoeft:1984:SSU,
  author =       "Arthur E. Oldehoeft and Robert McDonald",
  title =        "A software scheme for user-controlled file
                 encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "35--41",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Porter:1984:CNS,
  author =       "Sig Porter",
  title =        "Cryptology and number sequences: Pseudorandom, random,
                 and perfectly random",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "43--44",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900257",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mullin:1984:NMP,
  author =       "Albert A. Mullin",
  title =        "A note on the mathematics of public-key
                 cryptosystems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "45--47",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900269",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ISa,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec'84}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "49--50",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900270",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:TWC,
  author =       "Anonymous",
  title =        "{TC-11} Working Conference on Informatics Security
                 Management",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "50--52",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900282",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Comer:1984:CCN,
  author =       "Michael Comer",
  title =        "Computer crime needs international countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "53--55",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900294",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRP,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{The puzzle palace: a report
                 on NSA, America's most secret agency}}: James Bamford:
                 Boston: Houghton Mifflin Company, 1982, 465 pages.
                 \$16.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "57--57",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900300",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRDa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Data protection-data
                 security-privacy}}: Luxembourg: Terminology Bureau of
                 the Commission of the European Countries, 1981. 776
                 pages}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "57--58",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900312",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRAa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Advances in computer
                 security management. Volume 1}}: Thomas A. Rullo,
                 editor: New York, (Heyden) John Wiley and Sons, 1980.
                 245 + xi pages}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "58--58",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900324",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRAb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Advances in computer
                 security management. Volume 2}}: Marvin M. Wofsey,
                 editor: New York: John Wiley and Sons, 1983. 268 + xix
                 pages. \$39.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "58--59",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900336",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRI,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Information integrity: a
                 structure for its definition and management}}: Hal
                 B. Becker: New York: McGraw Hill Book Co., 1983. 237 +
                 xiii pages. \$26.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "59--60",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900348",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:BRDb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Dictionary of computers,
                 data processing and telecommunications}}: Jerry
                 M. Rosenberg: New York: John Wiley and Sons, 1984. 614
                 + ix pages. \$29.95 hardcover, \$14.95 paperback}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "60--60",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490035X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "61--72",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900361",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "73--75",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900373",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490018X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:PF,
  author =       "Anonymous",
  title =        "Pages 1--75 ({February 1984})",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1984:Ea,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "77--79",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900488",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:NMI,
  author =       "Anonymous",
  title =        "New members of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "80--80",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490049X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1984:SSP,
  author =       "Donn B. Parker",
  title =        "Safeguards selection principles",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "81--91",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900506",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1984:PAS,
  author =       "Rolf T. Moulton",
  title =        "A practical approach to system security devices",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "93--99",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900518",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sorkin:1984:MCC,
  author =       "Arthur Sorkin and C. James Buchanan",
  title =        "Measurement of cryptographic capability protection
                 algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "101--116",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490052X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kaperonis:1984:IE,
  author =       "Ilias Kaperonis",
  title =        "Industrial espionage",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "117--121",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900531",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bump:1984:PSP,
  author =       "Morrison Bump",
  title =        "A primer on software piracy cases in the courts",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "123--134",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900543",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ICC,
  author =       "Anonymous",
  title =        "{International Carnahan Conference on Security
                 Technology}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "135--139",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900555",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ISJ,
  author =       "Anonymous",
  title =        "The {IPSA Silver Jubilee} conference",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "139--140",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900567",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1984:S,
  author =       "Charles Cresson Wood",
  title =        "Securicom '84",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "140--142",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900579",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ISb,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec'84}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "143--144",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:POC,
  author =       "Anonymous",
  title =        "Professional organizations in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "145--150",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "151--163",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900609",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "165--167",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900610",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:PM,
  author =       "Anonymous",
  title =        "Pages 77--167 ({May 1984})",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "??--??",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1984:Eb,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "169--170",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900385",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vandenBerg:1984:ATC,
  author =       "Bram van den Berg and Hans Leenaars",
  title =        "Advanced topics of a computer center audit",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "171--185",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900397",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barton:1984:UFP,
  author =       "Ben F. Barton and Marthalee S. Barton",
  title =        "User-friendly password methods for computer-mediated
                 information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "186--195",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900403",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fugini:1984:ACM,
  author =       "M. Fugini and G. Martella",
  title =        "{ACTEN}: a conceptual model for security systems
                 design",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "196--214",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900415",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nestman:1984:TTS,
  author =       "Chadwick H. Nestman and John C. Windsor and Mary C.
                 Hinson",
  title =        "Tutorial on telecommunications and security",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "215--224",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900427",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Polis:1984:ISR,
  author =       "Richard I. Polis",
  title =        "Information security: Reality and fiction",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "225--228",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900439",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fisher:1984:CCS,
  author =       "Warren W. Fisher",
  title =        "Cryptography for computer security: Making the
                 decision",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "229--233",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900440",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krause:1984:DEI,
  author =       "Lothar Krause",
  title =        "Data encryption in {ISO}, the International
                 Organization for Standardization",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "234--236",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900452",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:CLD,
  author =       "Anonymous",
  title =        "Computer law decisions and opinions",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "237--248",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900464",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "249--251",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900476",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:PA,
  author =       "Anonymous",
  title =        "Pages 169--251 ({August 1984})",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "??--??",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:M,
  author =       "Anonymous",
  title =        "In Memoriam",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "253--255",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1984:Ec,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "257--257",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900026",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1984:CSE,
  author =       "Ronald Paans",
  title =        "Computer security and {EDP}-auditing: the twin
                 guards",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "259--261",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herschberg:1984:PTC,
  author =       "I. S. Herschberg and R. Paans",
  title =        "The programmer's threat: Cases and causes",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "263--272",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490004X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buurmeijer:1984:IDS,
  author =       "F. Buurmeijer",
  title =        "{IBM}'s data security strategy: Some implementation
                 aspects",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "273--277",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1984:TSM,
  author =       "R. Paans and I. S. Herschberg",
  title =        "A topology for secure {MVS} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "278--285",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900063",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Louwerse:1984:DPA,
  author =       "C. P. Louwerse and J. M. L. Kouwenberg",
  title =        "Data protection aspects in an integrated hospital
                 information system",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "286--294",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900075",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanHoboken:1984:BV,
  author =       "W. R. C. van Hoboken",
  title =        "The burglar's viewpoint",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "295--302",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900087",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Toppen:1984:ICA,
  author =       "R. Toppen",
  title =        "Infinite confidence: `The audit of data communication
                 networks'",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "303--313",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900099",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vandeGoor:1984:ETD,
  author =       "A. J. van de Goor",
  title =        "Effects of technical developments on system security",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "314--322",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900105",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1984:EEC,
  author =       "Ronald Paans",
  title =        "{ECOMA-12: European Computer Measurement Association
                 Conference}: Special interest group on performance
                 aspects of computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "323--324",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900117",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:Cd,
  author =       "Anonymous",
  title =        "Crypto '84",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "324--325",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900129",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:SDD,
  author =       "Anonymous",
  title =        "Security in distributed data sharing systems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "325--327",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900130",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "328--341",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "342--345",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900154",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 3",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "346--349",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900166",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 3",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "350--351",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900178",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1984:PN,
  author =       "Anonymous",
  title =        "Pages 253--351 ({November 1984})",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:Ea,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:NMIa,
  author =       "Anonymous",
  title =        "New member of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1985:CFA,
  author =       "John M. Carroll and W. R. Mac Iver",
  title =        "{COSSAC}: a framework for analyzing and configuring
                 secure computer facilities",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "5--12",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schweitzer:1985:MVC,
  author =       "James A. Schweitzer",
  title =        "A management view: computer security as a
                 discretionary decision",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "13--22",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gal:1985:SIA,
  author =       "Graham Gal and William E. McCarthy",
  title =        "Specification of internal accounting controls in a
                 database environment",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "23--32",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cerullo:1985:GCC,
  author =       "Michael J. Cerullo",
  title =        "General controls in computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "33--45",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Serpell:1985:CES,
  author =       "Stephen C. Serpell",
  title =        "Cryptographic equipment security: a code of practice",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "47--64",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:FNC,
  author =       "Harold Joseph Highland",
  title =        "The first national computer security conference",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "65--73",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:DSC,
  author =       "Anonymous",
  title =        "Data security and confidentiality",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "75--81",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "83--95",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "97--99",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488590001X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:PM,
  author =       "Anonymous",
  title =        "Pages 1--100 ({March 1985})",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "1",
  pages =        "??--??",
  month =        mar,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:Eb,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "101--102",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Auerbach:1985:PRI,
  author =       "Isaac L. Auerbach",
  title =        "Professional responsibility for information privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "103--107",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yeo:1985:IAC,
  author =       "Gee Kin Yeo",
  title =        "Incorporating access control in forms systems",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "109--122",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488590015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:MSD,
  author =       "Harold Joseph Highland",
  title =        "Microcomputer security: Data protection techniques",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "123--134",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1985:EAR,
  author =       "Belden Menkus",
  title =        "The {EDP} auditor's role in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "135--138",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miller:1985:TCS,
  author =       "James E. Miller",
  title =        "Transaction controls: Steps to take after the
                 equipment has been secured",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "139--141",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:1985:DSL,
  author =       "Jan H. P. Eloff",
  title =        "The development of a specification language for a
                 computer security system",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "143--147",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoving:1985:MFM,
  author =       "Per L. Hoving and Johan Ess{\'e}n",
  title =        "Minutes from the first meeting of {TC} 11, security
                 and protection in information processing systems",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "149--152",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:ITC,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11 members",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "153--159",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:SIC,
  author =       "Anonymous",
  title =        "Second international congress on computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "161--171",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:POC,
  author =       "Anonymous",
  title =        "Professional organizations in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "173--174",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "175--181",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "183--184",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:PJ,
  author =       "Anonymous",
  title =        "Pages 101--184 ({June 1985})",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:EOA,
  author =       "Harold Joseph Highland",
  title =        "Editorial: {Office} automation {\em or} on the value
                 of being a dinosaur",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "185--186",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:NMIb,
  author =       "Anonymous",
  title =        "New members of the international board of editors",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "187--187",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1985:SCN,
  author =       "Fred Cohen",
  title =        "A secure computer network design",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "189--205",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chamoux:1985:DSC,
  author =       "J. P. Chamoux",
  title =        "Data security and confidentiality in {Europe}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "207--210",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488590029X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pieprzyk:1985:MDI,
  author =       "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
  title =        "Modular design of information encipherment for
                 computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "211--218",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1985:IBS,
  author =       "Belden Menkus",
  title =        "The impact of the {Bell} system breakup on {DP}
                 disaster recovery planning",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "219--222",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1985:FDS,
  author =       "Charles Cresson Wood",
  title =        "Floppy diskette security measures",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "223--228",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488590032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:DNC,
  author =       "Anonymous",
  title =        "7th {DoD\slash NBS} computer security conference",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "229--237",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:S,
  author =       "Anonymous",
  title =        "Securicom '85",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "238--242",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:N,
  author =       "Anonymous",
  title =        "Networks '84",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "242--243",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{HJH:1985:UCC,
  author =       "HJH",
  title =        "{U.S.} computer crime legislation highlighted in
                 special report",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "245--246",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{HJH:1985:BRK,
  author =       "HJH",
  title =        "Book Review: {{\booktitle{Kahn on codes: Secrets of
                 the new cryptology}}: David Kahn New York: Macmillan
                 Publishing Company, 1984. 344 + viii pages, \$19.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "247--247",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{HJH:1985:BRM,
  author =       "HJH",
  title =        "Book Review: {{\booktitle{Managing risk: a
                 computer-aided strategy}}: John M. Carroll Boston:
                 Butterworths, 1984. 277 + xvi pages, \$18.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "247--248",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1985:BRS,
  author =       "Charles Cresson Wood",
  title =        "Book Review: {{\booktitle{Security for computer
                 networks}}: D. W. Davies and W. L. Price New York: John
                 Wiley and Sons, 1984. 386 + xix pages, \$19.50}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "248--249",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{EHH:1985:BRT,
  author =       "EHH",
  title =        "Book Review: {{\booktitle{Transborder data flows:
                 access to the international on-line data-base market}}:
                 Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl
                 75.00\slash {US} \$28.75}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "249--249",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{HJH:1985:BRC,
  author =       "HJH",
  title =        "Book Review: {{\booktitle{Communication regulation and
                 international business}}: Juan F. Rada and G. Russell
                 Pipe, editors Amsterdam: North-Holland, 1984. 266 + x
                 pages, Dfl. 120.00\slash US \$46.25}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "249--249",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{EHH:1985:PSC,
  author =       "EHH",
  title =        "Proceedings of the seventh computer security group
                 conference: {Washington: US Government Printing
                 Office}, 1984 --- 776-101\slash 1027. 115 pages",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "249--250",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:ARAc,
  author =       "Anonymous",
  title =        "Abstract of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "251--263",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "265--266",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:PS,
  author =       "Anonymous",
  title =        "Pages 185--266 ({September 1985})",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1985:Ec,
  author =       "Harold Joseph Highland",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "267--268",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanEck:1985:ERV,
  author =       "Wim van Eck",
  title =        "Electromagnetic radiation from video display units: an
                 eavesdropping risk?",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "269--286",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488590046X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wong:1985:CCR,
  author =       "Ken Wong",
  title =        "Computer crime --- Risk management and computer
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "287--295",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900471",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pieprzyk:1985:DPK,
  author =       "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
  title =        "Design of public key cryptosystems using idempotent
                 elements",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "297--308",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900483",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{deBruyne:1985:SVU,
  author =       "P. de Bruyne",
  title =        "Signature verification using holistic measures",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "309--315",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{duCroix:1985:DSA,
  author =       "A. J. du Croix",
  title =        "Data sharing and access protection in business system
                 12",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "317--323",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900501",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Voydock:1985:SMT,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security mechanisms in a transport layer protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "325--341",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:SS,
  author =       "Anonymous",
  title =        "Systems Security",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "343--347",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "349--362",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "363--364",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 4",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "365--366",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900550",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 4",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "367--367",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900562",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1985:PD,
  author =       "Anonymous",
  title =        "Pages 267--367 ({December 1985})",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "??--??",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ILa,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:NMI,
  author =       "Anonymous",
  title =        "New member of the international board of editors",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "2--2",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:NPR,
  author =       "Anonymous",
  title =        "News from the Peoples {Republic} of {China}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:D,
  author =       "Anonymous",
  title =        "The demise of the {DES}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "3--4",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:TWa,
  author =       "Anonymous",
  title =        "Technology watch",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "4--6",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:IS,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec} '86",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "6--7",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PSM,
  author =       "Anonymous",
  title =        "Physical security of microcomputers and terminals",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "7--8",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:MMC,
  author =       "Anonymous",
  title =        "Microcomputer-mainframe communications link",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "8--8",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:DOD,
  author =       "Anonymous",
  title =        "Don't overlook data compression",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "8--9",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:WFF,
  author =       "Anonymous",
  title =        "Wanted: Floods, fires, disasters, etc.",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "10--10",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1986:WDW,
  author =       "Bernard P. Zajac",
  title =        "What to do when you have reason to believe your
                 computer has been compromised",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "11--16",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kinnon:1986:ASI,
  author =       "A. Kinnon and R. H. Davis",
  title =        "Audit and security implications of electronic funds
                 transfer",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "17--23",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goeltz:1986:W,
  author =       "Ted Goeltz",
  title =        "Why not {DES}?",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "24--27",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harper:1986:ICL,
  author =       "Robert M. Harper",
  title =        "Internal control in local area networks: an
                 accountant's perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "28--35",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690115X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vandenAssem:1986:CPA,
  author =       "R. van den Assem and W. J. van Elk",
  title =        "A chosen-plaintext attack on the {Microsoft BASIC}
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "36--45",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1986:HCM,
  author =       "R. Paans and I. S. Herschberg",
  title =        "How to control {MVS} user supervisor calls",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "46--54",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "55--67",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Owen:1986:CSI,
  author =       "Kenneth Owen",
  title =        "Computer security: {IFIP} addresses the practical
                 issues",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "68--72",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:TSR,
  author =       "Anonymous",
  title =        "{TC} 11 status report",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "72--73",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoving:1986:SST,
  author =       "Per Hoving",
  title =        "System security: the technical challenge",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "74--79",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "80--82",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PM,
  author =       "Anonymous",
  title =        "Pages 1--82 ({March 1986})",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "??--??",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ILb,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "83--83",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Essen:1986:NMI,
  author =       "Johan Essen",
  title =        "New member of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "84--84",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ERRa,
  author =       "Harold Joseph Highland",
  title =        "Electromagnetic radiation revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "85--93",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:BDT,
  author =       "Anonymous",
  title =        "{``Back door''} trespassing",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "94--94",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:TWb,
  author =       "Anonymous",
  title =        "Technology watch",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "94--97",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:SSR,
  author =       "Anonymous",
  title =        "Some suggested reading",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "97--97",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:SR,
  author =       "Anonymous",
  title =        "Security reminders",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "97--98",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690129X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:CPC,
  author =       "Anonymous",
  title =        "On cryptographic protection of capabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "98--99",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:SN,
  author =       "Anonymous",
  title =        "On a serious (?) note",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "99--99",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ware:1986:EPIa,
  author =       "Willis H. Ware",
  title =        "Emerging privacy issues",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "101--113",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690132X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1986:SMP,
  author =       "Charles Cresson Wood and Howard M. Zeidler",
  title =        "Security modules: Potent information security system
                 components",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "114--121",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoebeke:1986:CSP,
  author =       "L. Hoebeke",
  title =        "Computer security --- Prevention: Lessons from the
                 operation of a nuclear power plant",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "122--127",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderLans:1986:DSR,
  author =       "R. F. van der Lans",
  title =        "Data security in a relational database environment",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "128--134",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Richards:1986:RMK,
  author =       "Roy Martin Richards and Jan Yestingsmeier",
  title =        "Risk management --- a key to security in the
                 electronic funds transfer system",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "135--140",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bishop:1986:PCS,
  author =       "Matt Bishop",
  title =        "A pauper's callback scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "141--144",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jansen:1986:KSR,
  author =       "C. J. A. Jansen",
  title =        "On the key storage requirements for secure terminals",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "145--149",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "150--164",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:WSR,
  author =       "Anonymous",
  title =        "{WG} 11:4 status report",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "165--166",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1986:DSR,
  author =       "John M. Carroll and Helmut J{\"u}rgensen",
  title =        "Design of a secure relational data base",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1986:SVH,
  author =       "Viiveke F{\aa}k",
  title =        "Software versus hardware encryption --- Is there any
                 difference today?",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Power:1986:AHE,
  author =       "June M. Power and Steve R. Wilbur",
  title =        "Authentication in a heterogeneous environment",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tompkins:1986:ISAa,
  author =       "Frederick G. Tompkins and Russel Rice",
  title =        "Intergrating security activities into the software
                 development life cycle and the software quality
                 assurance process",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ware:1986:EPIb,
  author =       "Willis H. Ware",
  title =        "Emerging privacy issues",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Worthington:1986:IDS,
  author =       "T. K. Worthington and J. J. Chainer and J. D. Willford
                 and S. C. Gunderson",
  title =        "{IBM} dynamic signature verification",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690146X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beatson:1986:DOA,
  author =       "John G. Beatson",
  title =        "Development and organization of the audit and security
                 functions",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doswell:1986:ACS,
  author =       "Roger T. Doswell",
  title =        "The audit, control and security of the project life
                 cycle --- Pre-implementation stage",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ekerbrink:1986:SET,
  author =       "Ivan Ekerbrink",
  title =        "Security of electronic transactions",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901483",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kingston:1986:SSB,
  author =       "Peter P. C. H. Kingston and Martin Goulbourn",
  title =        "Security for small business computers",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kugler:1986:CPI,
  author =       "Han-J{\"u}rgen Kugler",
  title =        "Concepts of protection in the {IFIP WG 2.7} reference
                 model for command and response languages",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901471",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tener:1986:DSS,
  author =       "William T. Tener",
  title =        "Decision support systems --- a necessity for effective
                 auditing of controls",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901501",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stanley:1986:ECC,
  author =       "Philip M. Stanley",
  title =        "Educating computer crime investigators",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "168--169",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Davies:1986:HUS,
  author =       "Donald W. Davies",
  title =        "How to use the {DES} safely",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "169--169",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901562",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murine:1986:PRS,
  author =       "Gerald E. Murine",
  title =        "Producing reliable, secure software",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "169--169",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1986:ETS,
  author =       "Charles Cresson Wood",
  title =        "Establishing technical systems security standards at a
                 large multinational bank",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "169--169",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901550",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:Cb,
  author =       "Anonymous",
  title =        "{CRYPTO} '85",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "170--176",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901574",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "177--178",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901586",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PJ,
  author =       "Anonymous",
  title =        "Pages 83--178 ({June 1986})",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ILc,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "179--180",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ERRb,
  author =       "Harold Joseph Highland and Viiveke F{\aa}k",
  title =        "Electromagnetic radiation revisited, part {II}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "181--184",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:MTT,
  author =       "Anonymous",
  title =        "Modern technology tools for user authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "184--185",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:MAC,
  author =       "Anonymous",
  title =        "Microcomputer access control limited by password,
                 time, day, and\slash or program",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "185--186",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:BL,
  author =       "Anonymous",
  title =        "In brief \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "187--188",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:MAT,
  author =       "Anonymous",
  title =        "Microcomputer audit trails made easy",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "188--189",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:RAP,
  author =       "Anonymous",
  title =        "Risk analysis package",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "189--190",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:CBa,
  author =       "Anonymous",
  title =        "Coffee break",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "190--190",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:HDD,
  author =       "Anonymous",
  title =        "Hard disk disaster recovery tool",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "190--192",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690009X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1986:EIT,
  author =       "Charles Cresson Wood",
  title =        "Establishing internal technical systems security
                 standards",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "193--200",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beatson:1986:MEA,
  author =       "John G. Beatson",
  title =        "Managing the {EDP} audit and security functions",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "201--206",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Richards:1986:ICR,
  author =       "Roy Martin Richards",
  title =        "Insuring computer risks",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "207--210",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690012X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoffman:1986:SVC,
  author =       "Lance J. Hoffman and Lucy M. Moran",
  title =        "Societal vulnerability to computer system failures",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "211--217",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tompkins:1986:ISAb,
  author =       "Frederick G. Tompkins and Russell S. Rice",
  title =        "Integrating security activities into the software
                 development life cycle and the software quality
                 assurance process",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "218--242",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pluimakers:1986:ACS,
  author =       "G. M. J. Pluimakers and J. van Leeuwen",
  title =        "Authentication: a concise survey",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "243--250",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lapid:1986:AHT,
  author =       "Yeheskel Lapid and Niv Ahituv and Seev Neumann",
  title =        "Approaches to handling {``Trojan Horse''} threats",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "251--256",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "257--272",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "273--275",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PS,
  author =       "Anonymous",
  title =        "Pages 179--275 ({September 1986})",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:ILd,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "277--278",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:AVA,
  author =       "Anonymous",
  title =        "Another view about passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "279--281",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:R,
  author =       "Anonymous",
  title =        "The {DES} revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "281--282",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690043X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:RRP,
  author =       "Anonymous",
  title =        "{RAM}-resident program security threat",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "282--285",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:AMS,
  author =       "Anonymous",
  title =        "Advanced microcomputer security system",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "285--287",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:III,
  author =       "Anonymous",
  title =        "{International Information Integrity Institute}",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "287--287",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:LLN,
  author =       "Anonymous",
  title =        "The lure of large numbers",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "287--287",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:RE,
  author =       "Anonymous",
  title =        "Remember the {Enigma}!",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "288--289",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tener:1986:DCD,
  author =       "William T. Tener",
  title =        "Detection of control deterioration using decision
                 support systems",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "290--295",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rutledge:1986:SIC,
  author =       "Linda S. Rutledge and Lance J. Hoffman",
  title =        "A survey of issues in computer network security",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "296--308",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stanley:1986:CCI,
  author =       "Philip M. Stanley",
  title =        "Computer crime investigation and investigators",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "309--313",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karger:1986:ADA,
  author =       "Paul A. Karger",
  title =        "Authentication and discretionary access control in
                 computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "314--324",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ekebrink:1986:DST,
  author =       "Ivan Ekebrink",
  title =        "Data security in terminalized system",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "325--327",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alagar:1986:HAT,
  author =       "V. S. Alagar",
  title =        "A human approach to the technological challenges in
                 data security",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "328--335",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murine:1986:SSI,
  author =       "Gerald E. Murine",
  title =        "Secure software's impact on reliability",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "336--339",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900556",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1986:HMM,
  author =       "Harold Joseph Highland",
  title =        "How to modify a microcomputer operating system for
                 added security",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "340--343",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Erdem:1986:HCO,
  author =       "Hilmi Erdem",
  title =        "Host cryptographic operations: a software
                 implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "344--346",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690057X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leahy:1986:PP,
  author =       "Patrick Leahy",
  title =        "Privacy and progress",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "347--349",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900581",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "350--359",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PIE,
  author =       "Anonymous",
  title =        "Protection of information in electronic systems",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "360--360",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690060X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:ERS,
  author =       "Anonymous",
  title =        "Electronic record systems and individual privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "361--362",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "363--364",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 5",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "365--366",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900635",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 5",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "367--368",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:PD,
  author =       "Anonymous",
  title =        "Pages 277--368 ({December 1986})",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "??--??",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:ILa,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "1--3",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:NMI,
  author =       "Anonymous",
  title =        "New members of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "4--7",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790112X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CVS,
  author =       "Harold Joseph Highland",
  title =        "Computer viruses and sudden death!",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "8--10",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:TWP,
  author =       "Anonymous",
  title =        "Technology watch --- Personal authentication devices",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "10--11",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:IS,
  author =       "Anonymous",
  title =        "{IFIP\slash Sec}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "12--12",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:EEF,
  author =       "Anonymous",
  title =        "Electromagnetic eavesdropping --- Fact of fantasy?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "12--14",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:OMN,
  author =       "Anonymous",
  title =        "Other meetings of note",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "14--14",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:RAT,
  author =       "Anonymous",
  title =        "Report about {TC} 11 working groups",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "14--14",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SR,
  author =       "Anonymous",
  title =        "Security reminder",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "15--15",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:P,
  author =       "Anonymous",
  title =        "{DOS} postscript",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "15--16",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1987:HSC,
  author =       "Rolf T. Moulton",
  title =        "How to supervise and control {I/S} Security Officers
                 and Auditors",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "17--21",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1987:CVT,
  author =       "Fred Cohen",
  title =        "Computer viruses: Theory and experiments",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "22--35",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1987:CMM,
  author =       "Viiveke F{\aa}k",
  title =        "Crypto management made manageable --- Demands on
                 crypto equipment design",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "36--40",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Power:1987:AHE,
  author =       "June M. Power and Steve R. Wilbur",
  title =        "Authentication in a heterogeneous environment",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "41--48",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Solarz:1987:CRE,
  author =       "Artur Solarz",
  title =        "Computer-related embezzlement",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "49--53",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901258",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Longley:1987:ESA,
  author =       "Dennis Longley",
  title =        "Expert systems applied to the analysis of key
                 management schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "54--67",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790126X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kingston:1987:SMU,
  author =       "Peter P. C. H. Kingston and Martin Goulbourn",
  title =        "Security for microcomputers used in small business",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "68--72",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:DPV,
  author =       "Harold Joseph Highland",
  title =        "Data physician --- a virus protection program",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "73--79",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "80--90",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SS,
  author =       "Anonymous",
  title =        "System Security 1986",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "91--93",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SEC,
  author =       "Anonymous",
  title =        "Second {European} Conference on Computer Audit,
                 Control and Security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "94--94",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "95--96",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901325",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PF,
  author =       "Anonymous",
  title =        "Pages 1--96 ({February 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:ILb,
  author =       "Harold Joseph Highland",
  title =        "In this issue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "97--98",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900745",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:HSY,
  author =       "Harold Joseph Highland",
  title =        "How secure are your encryption keys?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "99--100",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:RPI,
  author =       "Harold Joseph Highland",
  title =        "The {DES} revisited --- Part {II}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "100--101",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900769",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CSN,
  author =       "Harold Joseph Highland",
  title =        "Computer security: a new focus at the {National Bureau
                 of Standards}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "102--103",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900770",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:TW,
  author =       "Harold Joseph Highland",
  title =        "Technology watch",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "103--108",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900782",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CCS,
  author =       "Harold Joseph Highland",
  title =        "The charade of computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "108--109",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900794",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:RNR,
  author =       "Harold Joseph Highland",
  title =        "Random notes and reports",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "109--110",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900800",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Saari:1987:CCN,
  author =       "Juhani Saari",
  title =        "Computer crime --- numbers lie",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "111--117",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900812",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohe:1987:PAI,
  author =       "Fred Cohe",
  title =        "Protection and administration of information networks
                 with partial orderings",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "118--128",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900824",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schweitzer:1987:HSF,
  author =       "James A. Schweitzer",
  title =        "How security fits in --- a management view: Security
                 is an essential for quality information",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "129--132",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herschberg:1987:HC,
  author =       "I. S. Herschberg",
  title =        "The hackers' comfort",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "133--138",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900848",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bui:1987:CEM,
  author =       "Tung Bui and Taracad R. Sivasankaran",
  title =        "Cost-effectiveness modeling for a decision support
                 system in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "139--151",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790085X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahituv:1987:VAI,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Verifying the authentication of an information system
                 user",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "152--157",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900861",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfitzmann:1987:NUO,
  author =       "Andreas Pfitzmann and Michael Waidner",
  title =        "Networks without user observability",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "158--166",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900873",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1987:ISI,
  author =       "Ronald Paans",
  title =        "{IFIP\slash Sec'86}: Information security: the
                 challenge",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "167--171",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900885",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1987:E,
  author =       "Ronald Paans",
  title =        "{ECOMA-14}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "172--172",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900897",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1987:FEC,
  author =       "Ronald Paans",
  title =        "First {European} Conference on Computer Audit, Control
                 and Security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "173--176",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:1987:PAC,
  author =       "J. A. N. Lee and Gerald Segal",
  title =        "Positive alternatives to computer misuse: a report of
                 the proceedings of an {ACM} panel on hacking",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "177--179",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "180--190",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "191--192",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900939",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PAa,
  author =       "Anonymous",
  title =        "Pages 97--192 ({April 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:Ea,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "193--194",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900940",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:DES,
  author =       "Harold Joseph Highland",
  title =        "Data encryption standard {II}?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "195--196",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900952",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:RB,
  author =       "Harold Joseph Highland",
  title =        "Report from {Beijing}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "196--198",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900964",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:IS,
  author =       "Harold Joseph Highland",
  title =        "Information sources",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "198--199",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:EP,
  author =       "Harold Joseph Highland",
  title =        "Encryption package",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "199--202",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:UDC,
  author =       "Harold Joseph Highland",
  title =        "{US} data controls",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "202--203",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790099X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CSL,
  author =       "Harold Joseph Highland",
  title =        "Computer security and law",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "203--205",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CC,
  author =       "Harold Joseph Highland",
  title =        "Cipher cracking",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "205--205",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rihaczek:1987:TOC,
  author =       "Karl Rihaczek",
  title =        "{TeleTrusT}-{OSIS} and communication security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "206--218",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1987:DAD,
  author =       "Fred Cohen",
  title =        "Design and administration of distributed and
                 hierarchical information networks under partial
                 orderings",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "219--228",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:HEM,
  author =       "Harold Joseph Highland",
  title =        "How to evaluate microcomputer encryption software and
                 hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "229--244",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dwyer:1987:MLS,
  author =       "Patricia A. Dwyer and George D. Jelatis and Bhavani M.
                 Thuraisingham",
  title =        "Multi-level security in database management systems",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "245--251",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Johnstone:1987:KUF,
  author =       "Richard J. Johnstone",
  title =        "Key updating flags in {EFT}-{POS} security systems",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "252--260",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanHeurck:1987:TBS,
  author =       "Ph. van Heurck",
  title =        "{TRASEC}: {Belgian} security system for electronic
                 funds transfers",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "261--268",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature: Computer
                 law",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "269--281",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "282--283",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790109X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PJ,
  author =       "Anonymous",
  title =        "Pages 193--283 ({June 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "??--??",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:EL,
  author =       "Harold Joseph Highland",
  title =        "From the editor \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "285--287",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900605",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:WYR,
  author =       "Harold Joseph Highland",
  title =        "Would you report a suspected data crime to the
                 authorities?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "288--295",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900617",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:TWA,
  author =       "Anonymous",
  title =        "Technology watch --- access control to mainframe",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "295--296",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900629",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:RA,
  author =       "Anonymous",
  title =        "Risk assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "297--298",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900630",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:VLR,
  author =       "Anonymous",
  title =        "Very light reading",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "298--299",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900642",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1987:SEU,
  author =       "John M. Carroll",
  title =        "Strategies for extending the useful lifetime of
                 {DES}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "300--313",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900654",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1987:ISS,
  author =       "Charles Cresson Wood",
  title =        "Information systems security: Management success
                 factors",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "314--320",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900666",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pozzo:1987:ACC,
  author =       "Maria M. Pozzo and Terence E. Gray",
  title =        "An approach to containing computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "321--331",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1987:DPI,
  author =       "Fred Cohen",
  title =        "Design and protection of an information network under
                 a partial ordering: a case study",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "332--338",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:1987:CRK,
  author =       "Chris Mitchell and Fred Piper",
  title =        "The cost of reducing key-storage requirements in
                 secure networks",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "339--341",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900691",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jung:1987:IRC,
  author =       "Achim Jung",
  title =        "Implementing the {RSA} cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "342--350",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900708",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1987:RWC,
  author =       "Viiveke F{\aa}k",
  title =        "Report from the working conference on ``the {Crypto
                 User's Handbook}'' held in {Stockholm, October 22--23,
                 1986 by IFIP WG 11:4}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "351--351",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "352--362",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900721",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "363--364",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900733",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PAb,
  author =       "Anonymous",
  title =        "Pages 285--364 ({August 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "??--??",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:Eb,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "365--367",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:SFT,
  author =       "Harold Joseph Highland",
  title =        "Secure fax transmission",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "368--370",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:HSE,
  author =       "Anonymous",
  title =        "High-speed encrypted storage\slash backup",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "370--373",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:MAU,
  author =       "Anonymous",
  title =        "Message authentication using the {RSA}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "373--376",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SRP,
  author =       "Anonymous",
  title =        "Secure remote power-on modem",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "376--378",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:WIS,
  author =       "Anonymous",
  title =        "Write it down safely",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "379--379",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790006X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SSC,
  author =       "Anonymous",
  title =        "Speedier secure communications",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "379--380",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:LI,
  author =       "Anonymous",
  title =        "Lock it up",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "380--381",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:RN,
  author =       "Anonymous",
  title =        "Random notes",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "381--382",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:GC,
  author =       "Anonymous",
  title =        "Guest comments",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "382--384",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spender:1987:ICU,
  author =       "J-C. Spender",
  title =        "Identifying computer users with authentication devices
                 (tokens)",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "385--395",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fernandez:1987:ACA,
  author =       "C. Fern{\'a}ndez and A. Vaquero and J. M. Troya and J.
                 M. S{\'a}nchez",
  title =        "Automating the computation of authenticators for
                 interbank telex messages",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "396--402",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1987:CSL,
  author =       "R. Paans and I. S. Herschberg",
  title =        "Computer security: the long road ahead",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "403--416",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Post:1987:IOS,
  author =       "Gerald V. Post",
  title =        "Improving operating system security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "417--425",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:NCC,
  author =       "Anonymous",
  title =        "{NTIS} computers, control and information theory",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "426--431",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAe,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature: Computer
                 law",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "432--441",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "442--443",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PO,
  author =       "Anonymous",
  title =        "Pages 365--443 ({October 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "??--??",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:Ec,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "445--446",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:NMI,
  author =       "Harold Joseph Highland",
  title =        "New member of the International Board of {Editors}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "447--447",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:CAM,
  author =       "Harold Joseph Highland",
  title =        "Computer abuse and managerial response",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "448--448",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900204",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:DCS,
  author =       "Harold Joseph Highland",
  title =        "Data cartridge for secure data",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "449--451",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:PR,
  author =       "Harold Joseph Highland",
  title =        "Passwords revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "451--452",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900228",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:OAS,
  author =       "Harold Joseph Highland",
  title =        "{Office} automation security",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "452--457",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488790023X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:TLC,
  author =       "Harold Joseph Highland",
  title =        "Tempest over leaking computers",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "457--458",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:HDR,
  author =       "Harold Joseph Highland",
  title =        "Hard disk recovery tools",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "458--462",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900253",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:RN,
  author =       "Harold Joseph Highland",
  title =        "Random notes",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "463--463",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900265",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1987:AUW,
  author =       "Sidney L. Smith",
  title =        "Authenticating users by word association",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "464--470",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900277",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baird:1987:MC,
  author =       "Bruce J. Baird and Lindsay L. Baird and Ronald P.
                 Ranauro",
  title =        "The moral cracker?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "471--478",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900289",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thuraisingham:1987:SCR,
  author =       "M. B. Thuraisingham",
  title =        "Security checking in relational database management
                 systems augmented with inference engines",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "479--492",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900290",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guarro:1987:PPL,
  author =       "Sergio B. Guarro",
  title =        "Principles and procedures of the {LRAM} approach to
                 information systems risk analysis and management",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "493--504",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900307",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1987:CCI,
  author =       "Fred Cohen",
  title =        "A cryptographic checksum for integrity protection",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "505--510",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1987:HIS,
  author =       "Charles Cresson Wood",
  title =        "The human immune system as an information systems
                 security reference model",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "511--516",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900320",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:ARAf,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "517--526",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900332",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "527--527",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 6",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "528--529",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 6",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "530--531",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900368",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:PD,
  author =       "Anonymous",
  title =        "Pages 445--531 ({December 1987})",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "??--??",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:E,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904877",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904865",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CHV,
  author =       "Harold Joseph Highland",
  title =        "Case history of a virus attack",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "3--5",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904889",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:EAE,
  author =       "Harold Joseph Highland",
  title =        "Encryption, attacks and ethics",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "5--6",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HPMa,
  author =       "Harold Joseph Highland",
  title =        "How to protect a microcomputer system",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "6--7",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904907",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CCC,
  author =       "Harold Joseph Highland",
  title =        "{Chernobyl} computer communications",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "7--9",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:EI,
  author =       "Harold Joseph Highland",
  title =        "Electromagnetic interference",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "9--10",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904920",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:IS,
  author =       "Harold Joseph Highland",
  title =        "{IFIP\slash Sec '88}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "10--10",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904932",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:YI,
  author =       "Harold Joseph Highland",
  title =        "For your information",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "10--11",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PR,
  author =       "Harold Joseph Highland",
  title =        "Product reviews",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "13--18",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904956",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Courtney:1988:APS,
  author =       "Robert H. Courtney",
  title =        "Another perspective on sensitive but unclassified
                 data",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "19--23",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904968",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HSF,
  author =       "Harold Joseph Highland",
  title =        "How secure are fiber optics communications?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "25--26",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890497X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SIT,
  author =       "Harold Joseph Highland",
  title =        "Secretdisk {II} --- transparent automatic encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "27--34",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904981",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1988:DCL,
  author =       "Bernard P. Zajac",
  title =        "Dial-up communication lines: Can they be secured?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "35--36",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904993",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PAO,
  author =       "Harold Joseph Highland",
  title =        "Program aids for office automation security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "37--43",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905007",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "45--46",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1988:GSD,
  author =       "Belden Menkus",
  title =        "Getting started in data processing disaster recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "47--52",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amsel:1988:NSA,
  author =       "Ellen Amsel",
  title =        "Network security and access controls",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "53--57",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahituv:1988:PSD,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Protecting statistical databases against retrieval of
                 private information",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "59--63",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Christoffersson:1988:MAE,
  author =       "Per Christoffersson",
  title =        "Message authentication and encryption combined",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "65--71",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lunt:1988:ELC,
  author =       "Teresa F. Lunt and Dorothy E. Denning and Roger R.
                 Schell and Mark Heckman and William R. Shockley",
  title =        "Element-level classification with A1 assurance",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "73--82",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Salomaa:1988:PKC,
  author =       "Arto Salomaa",
  title =        "A public-key cryptosystem based on language theory",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "83--87",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890507X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NLK,
  author =       "Anonymous",
  title =        "New locks and keys for electronic information",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "89--93",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "95--96",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WWRa,
  author =       "Anonymous",
  title =        "World-wide reports on developments in computer
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "97--100",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890510X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ADD,
  author =       "Anonymous",
  title =        "Anatomy of a disaster: {David Davies}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "101--101",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:AUS,
  author =       "Anonymous",
  title =        "{Apple} urges separate copyright registration of
                 screen displays: {Scott} Mace",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "101--101",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:FSP,
  author =       "Anonymous",
  title =        "Fighting software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "101--101",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:GSP,
  author =       "Anonymous",
  title =        "Guidelines or standards! {Part} one: {Yvo
                 Henniker-Heaton}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "101--101",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:JOP,
  author =       "Anonymous",
  title =        "{Justice} ordered to pay software licensing fees: {Tim
                 McGraw}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "101--101",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:BRCa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Computer crime --- What to
                 do before it happens}}: Bernard P. Zajac, Jr.}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:GCH,
  author =       "Anonymous",
  title =        "{German} computer hobbyists rifle {NASA}'s files:
                 {Serge Schmemann}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:GUD,
  author =       "Anonymous",
  title =        "1-2-3 to go unprotected: {Douglas Barney}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HRU,
  author =       "Anonymous",
  title =        "{HK} raid uncovers {Autodesk} pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905202",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LPN,
  author =       "Anonymous",
  title =        "{Lotus} promises new releases, no protection:
                 {Virginia} Dudek",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905184",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MCS,
  author =       "Anonymous",
  title =        "{MIS} computer security slacking: {June Altman}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NSC,
  author =       "Anonymous",
  title =        "{NASA} says classified data not breached: {Rick
                 Vizachero}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "102--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905226",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PED,
  author =       "Anonymous",
  title =        "Processing encrypted data: {Niv Ahituv, Yeheskel
                 Lapid, and Seev Neumann}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890524X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PPI,
  author =       "Anonymous",
  title =        "Public policy and internal privacy codes: {Tom
                 Riley}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905263",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NMB,
  author =       "Anonymous",
  title =        "{``Never mind!''} businesses cool off on site license
                 issue: {Ed Scannell}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:TPD,
  author =       "Anonymous",
  title =        "Tactical planning for data security management:
                 {Sandra M. Mann Lambert}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905251",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lewis:1988:WPP,
  author =       "Peter H. Lewis",
  title =        "When the password is a passkey",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Weber:1988:EAP,
  author =       "Ron Weber",
  title =        "Has {EDP} audit progressed in the last 15 years?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RSCa,
  author =       "Anonymous",
  title =        "Report says computers spy on 7 million workers in
                 {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905299",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bozman:1988:ISR,
  author =       "Jean S. Bozman",
  title =        "{IBM} slow to remedy leaky {DB2} security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bozman:1988:USF,
  author =       "Jean S. Bozman",
  title =        "Users see flaws in audit trails, access authority",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905342",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1988:ACP,
  author =       "John M. Carroll and Lynda Robbins",
  title =        "The automated cryptananysis of polyalphabetic
                 ciphers",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hargrove:1988:SIA,
  author =       "Robert Hargrove",
  title =        "Secure information is accurate information",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hunter:1988:DRN,
  author =       "Philip Hunter",
  title =        "Disaster recovery needed",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905305",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McDonald:1988:NDU,
  author =       "Evelyn C. McDonald",
  title =        "{North} didn't understand delete function",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905317",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bennett:1988:AEA,
  author =       "John Bennett",
  title =        "Analysis of the encryption algorithm used in the
                 {WordPerfect} word processing program",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "chttp://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goff:1988:IUT,
  author =       "Leslie Goff",
  title =        "{IBM} users told data files could have legal
                 pitfalls",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905408",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horwitt:1988:OSS,
  author =       "Elisabeth Horwitt",
  title =        "{OSI} security system revealed",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905378",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hunter:1988:CTM,
  author =       "Philip Hunter",
  title =        "Computer trouble makes {British} skies unfriendly",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890538X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1988:SR,
  author =       "Stephen Jones and {Senior Editors}",
  title =        "{LA} sites rocked",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Munro:1988:NRM,
  author =       "Neil Munro",
  title =        "New risk management lab will tackle security needs",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890541X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Grimm:1988:DEH,
  author =       "Vanessa Jo Grimm",
  title =        "Data errors hurt {State Department} system",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905421",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HMD,
  author =       "Anonymous",
  title =        "{Hospital}'s medical data held in strict security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905433",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SIC,
  author =       "Anonymous",
  title =        "Security issues concern {NSA}, vendors",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Betts:1988:ESG,
  author =       "Mitch Betts",
  title =        "Encryption standard to get reprieve",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chandler:1988:LIN,
  author =       "Harriette L. Chandler",
  title =        "{LANS} introduce new security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905469",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sopko:1988:FHD,
  author =       "Sandra Sopko",
  title =        "Fire and humidity: Data safes protect against both",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905445",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wong:1988:SOA,
  author =       "Ken Wong",
  title =        "Security and office automation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905482",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCL,
  author =       "Anonymous",
  title =        "Development of confidence limits by pivotal functions
                 for estimating software reliability",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905500",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:FTC,
  author =       "Anonymous",
  title =        "Fault tolerant computers and multiprocessing. {January
                 1985--June 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905494",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{ben-Aaron:1988:TCC,
  author =       "Diana ben-Aaron and Lee Green",
  title =        "{Today}'s computer crime: the threat from within",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905548",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crockett:1988:ASU,
  author =       "Barton Crockett and Cassimir J. Medford",
  title =        "After the street's unforgettable week all info systems
                 are (mostly) go",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905512",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hunter:1988:LSC,
  author =       "Philip Hunter",
  title =        "In {London}, stocks up and computers down",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905536",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ko:1988:JMW,
  author =       "Dorothy Ko",
  title =        "In {Japan}, {MIS} weathers the storm easily",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "107--107",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905524",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miles:1988:PPP,
  author =       "J. B. Miles",
  title =        "Public-private partners work on secure protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "108--108",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905585",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miles:1988:USC,
  author =       "J. B. Miles",
  title =        "Unclassified security calls for a `friendly'
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "108--108",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905573",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Munro:1988:ETD,
  author =       "Neil Munro",
  title =        "Expert tells {DoD} it needs training, not more
                 tempest",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "108--108",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905561",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Perry:1988:SSA,
  author =       "William E. Perry",
  title =        "Software still is arriving with those annoying bugs",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "108--108",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890555X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:APa,
  author =       "Anonymous",
  title =        "Addresses of publications",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "108--110",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905597",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "111--111",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905603",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PF,
  author =       "Anonymous",
  title =        "Pages 1--111 ({February 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:Ea,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "114--114",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LEa,
  author =       "Anonymous",
  title =        "Letters to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "115--116",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RBB,
  author =       "Anonymous",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "117--127",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bound:1988:DST,
  author =       "William A. J. Bound",
  title =        "Discussing security with top management",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "129--130",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1988:POH,
  author =       "Bernard P. Zajac",
  title =        "Personnel: the other half of data security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "131--132",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1988:UUP,
  author =       "Belden Menkus",
  title =        "Understanding the use of passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "132--136",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1988:PMM,
  author =       "G. J. Bologna",
  title =        "Pitfalls in measuring {MIS} performance",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "137--138",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murray:1988:AEC,
  author =       "W. H. Murray",
  title =        "The application of epidemiology to computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "139--145",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AVA,
  author =       "Harold Joseph Highland",
  title =        "Anatomy of a virus attack",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "145--150",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1988:WVV,
  author =       "Viiveke F{\aa}k",
  title =        "Are we vulnerable to a virus attack?. {A} report from
                 {Sweden}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "151--155",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890329X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:VDA,
  author =       "Anonymous",
  title =        "Virus defense alert",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "156, 158",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:OVP,
  author =       "Harold Joseph Highland",
  title =        "An overview of 18 virus protection products",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "157--161",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HCC,
  author =       "Harold Joseph Highland",
  title =        "How to combat a computer virus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "157, 161--163",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890332X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "165--166",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1988:ICV,
  author =       "Fred Cohen",
  title =        "On the implications of computer viruses and methods of
                 defense",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "167--184",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Straub:1988:OSC,
  author =       "Detmar W. Straub",
  title =        "Organizational structuring of the computer security
                 function",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "185--195",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herschberg:1988:MTH,
  author =       "I. S. Herschberg",
  title =        "Make the tigers hunt for you",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "197--203",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "205--206",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WWRb,
  author =       "Anonymous",
  title =        "World-wide reports on developments in computer
                 security: Part {II}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "207--209",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WSa,
  author =       "Anonymous",
  title =        "What others are saying",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "210--212",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ASV,
  author =       "Anonymous",
  title =        "Aftershocks for {Silicon Valley}: {{\em {Richard}
                 Raysman and Peter Brown}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--213",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCTa,
  author =       "Anonymous",
  title =        "{Dickerson} center of tug-of-war: {{\em Stephen
                 Jones}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--213",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HLR,
  author =       "Anonymous",
  title =        "Hold that Lawsuit: {{\em Rosemary Hamilton}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--213",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LPC,
  author =       "Anonymous",
  title =        "Legal protection for computer software",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--213",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MBS,
  author =       "Anonymous",
  title =        "{Microsoft}, {Borland} Settle {Dickerson} Case: {{\em
                 Rachel Parker}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--213",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CSS,
  author =       "Anonymous",
  title =        "Computer security shift is approved by {Senate}: {{\em
                 {Linda} Greenhouse}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "213--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HKF,
  author =       "Anonymous",
  title =        "{Hong Kong} focus: {{\em Michael D. Pendleton}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903483",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hughes:1988:ARA,
  author =       "Pamela L. Hughes",
  title =        "Abstract of recent articles and literature: Radio
                 frequency interfaces --- Myths, realities and a
                 practical approach",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903471",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RIA,
  author =       "Anonymous",
  title =        "Remote identification and authentication of computer
                 resource users: {{\em {Ken} Weiss}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SVE,
  author =       "Anonymous",
  title =        "Security in the {VM} environment: {{\em {William} H.
                 Murray}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903501",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SWL,
  author =       "Anonymous",
  title =        "Shrink-wrap licensing: {{\em Christopher J.
                 Millard}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890346X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SPE,
  author =       "Anonymous",
  title =        "Security planning for {EFT} network systems: {{\em A.
                 D. Davis}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CUS,
  author =       "Anonymous",
  title =        "Computer user surveillance: {{\em Kevin J.
                 Fitzgerald}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:BRCb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Computer viruses --- a
                 secret threat}}: Rudiger Dierstein}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:H,
  author =       "Anonymous",
  title =        "Horatius",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903562",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ICT,
  author =       "Anonymous",
  title =        "Insurance and computers: the technology gap: {{\em
                 David Davis}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MKF,
  author =       "Anonymous",
  title =        "{Manage\slash 38}: {{\em Kevin Fitzgerald}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903550",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:BTT,
  author =       "Anonymous",
  title =        "Buyers turning toward software escrow plans: {{\em
                 Carole Patton}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903574",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CFR,
  author =       "Anonymous",
  title =        "Conference focuses on reduction of software risks:
                 {{\em Darryl K. Taft}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903604",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DSP,
  author =       "Anonymous",
  title =        "Data security provides the key to lock out intruders:
                 {{\em {Howard} C. Berkowitz}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903628",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:FTA,
  author =       "Anonymous",
  title =        "Faulty tolerance adds security to critical on-line
                 transactions: {{\em {William} C. Grover}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903586",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HSL,
  author =       "Anonymous",
  title =        "How to secure a local area network: {{\em Philip C.
                 McKinney.}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903598",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SAF,
  author =       "Anonymous",
  title =        "{Senate} approves funds for {DEA Tempest} equipment:
                 {{\em Vanessa Jo Grim}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--216",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903616",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PMT,
  author =       "Anonymous",
  title =        "{PC}--mainframe ties hard to guard: {{\em Paula S.
                 Stone}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "216--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890363X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ASS,
  author =       "Anonymous",
  title =        "{Apollo} skirts site license issue: {{\em {James}
                 Connolly}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903690",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:BM,
  author =       "Anonymous",
  title =        "Battling Mediocrity",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903677",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCL,
  author =       "Anonymous",
  title =        "Crash course: Lessons in preventing computer downtime:
                 {{\em {Lee} Green}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903653",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NFG,
  author =       "Anonymous",
  title =        "Net failures growing concern in workplace: {{\em Mark
                 Stevens}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903641",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NNC,
  author =       "Anonymous",
  title =        "{NSA}, {NBS} coming together on computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903689",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NWL,
  author =       "Anonymous",
  title =        "New wave of {LAN} security products hailed by users:
                 {{\em {Susan} Kerr}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "217--217",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903665",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HSS,
  author =       "Anonymous",
  title =        "Hardware, software security devices protect {PCs} and
                 inside information: {{\em {Robert} L. Scheier}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903720",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MAS,
  author =       "Anonymous",
  title =        "{MIS} assumes a shirt-sleeves approach to protecting
                 power: {{\em Jeff Goodwin}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903756",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MSH,
  author =       "Anonymous",
  title =        "Most systems held fast while storm clouds grew on Wall
                 St: {{\em {Alan} Alper}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903732",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NEW,
  author =       "Anonymous",
  title =        "No easy way through data-security maze, consultants
                 say: {{\em {Robert} L. Scheier}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903719",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SLD,
  author =       "Anonymous",
  title =        "Is site licensing a dead issue?: {{\em Stephanie
                 Wilkinson}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903744",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SSF,
  author =       "Anonymous",
  title =        "The structure of system\slash 88, a fault-tolerant
                 computer: {{\em E. S. Harrison and E. J. Schmitt}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--218",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903707",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:UPS,
  author =       "Anonymous",
  title =        "Uninterruptible power supplies",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "218--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903768",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCSa,
  author =       "Anonymous",
  title =        "Coalition to combat software piracy: {{\em Rachel
                 Parker}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903781",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:GYD,
  author =       "Anonymous",
  title =        "Guarding your data: {{\em Julie Anderson}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890377X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HPC,
  author =       "Anonymous",
  title =        "Hardware protection of communications ports and lines:
                 {{\em Eugene F. Troy}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903811",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PSP,
  author =       "Anonymous",
  title =        "Policies for secure personal data: {Thomas B. Riley}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890380X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SCM,
  author =       "Anonymous",
  title =        "Security considerations for minicomputer systems
                 acquisitions: {{\em Sandra M. Mann Lambert}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903823",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SCU,
  author =       "Anonymous",
  title =        "A security checklist for upper management: {{\em
                 Jerome Lobel}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "219--219",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903793",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:AFA,
  author =       "Anonymous",
  title =        "{ANSI}, {Feds} address {DMBS} security: {{\em Mitch
                 Betts}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903860",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CTL,
  author =       "Anonymous",
  title =        "To catch a thief: Lessons in systems security: {{\em
                 {Michael} Ball}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903884",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CVA,
  author =       "Anonymous",
  title =        "The corporate view: {{\em {Alex} Kask}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903835",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:FBL,
  author =       "Anonymous",
  title =        "Fuss over bottom line could foil disaster recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903859",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NPD,
  author =       "Anonymous",
  title =        "{NASD} power dip could recur: {{\em {Barton}
                 Crockett}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903872",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WFT,
  author =       "Anonymous",
  title =        "Wanted: Full-time contingency planners: {{\em {David}
                 A. Ludlum}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--220",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903847",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SSG,
  author =       "Anonymous",
  title =        "Security systems: Getting management to shell out:
                 {{\em Larry Stevens}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "220--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903896",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DEK,
  author =       "Anonymous",
  title =        "Data encryption is key to safe file transmission:
                 {{\em Lawrence E. Hughes}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ESNa,
  author =       "Anonymous",
  title =        "Expert sees national security risks in {BASIS} net:
                 {{\em {Wayne} Madsen}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903902",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LGH,
  author =       "Anonymous",
  title =        "Loophole gives hackers access to {DEC} machines: {{\em
                 Marlene Brown}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NNS,
  author =       "Anonymous",
  title =        "{NBS} and {NSA} stand on different sides of security:
                 {{\em Evelyn C. MacDonald.}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903914",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ESV,
  author =       "Anonymous",
  title =        "Evaluating signature verification systems is tricky:
                 {{\em {Rodney} Beatson}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--222",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890394X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "224--224",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903951",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PAa,
  author =       "Anonymous",
  title =        "Pages 114--224 ({April 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highlands:1988:E,
  author =       "Dr. Harold Joseph Highlands",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "228--228",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LEb,
  author =       "Anonymous",
  title =        "Letters to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "229--231",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890017X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:OSH,
  author =       "Dr. Harold Joseph Highland",
  title =        "{Open Sesame} --- Hackers welcome",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "232--233",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900181",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SDD,
  author =       "Dr. Harold Joseph Highland",
  title =        "Security director's dilemma",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "233--235",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900193",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HTV,
  author =       "Dr. Harold Joseph Highland",
  title =        "How to test a virus filter without a virus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "235--237",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890020X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VDR,
  author =       "Dr. Harold Joseph Highland",
  title =        "Virus disaster red book",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "237--237",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900211",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:BCV,
  author =       "Dr. Harold Joseph Highland",
  title =        "Blitzed by a computer virus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "237--239",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SVP,
  author =       "Dr. Harold Joseph Highland",
  title =        "Special virus protection measures",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "239--242",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:UCN,
  author =       "Dr. Harold Joseph Highland",
  title =        "Upcoming conferences of note",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "242--243",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900247",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SWS,
  author =       "Dr. Harold Joseph Highland",
  title =        "Star wars security or where did those micros go?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "243--244",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1988:MIS,
  author =       "Jack Bologna",
  title =        "Managing an information system crisis",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "245--247",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900260",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1988:DDP,
  author =       "Bernard P. Zajac",
  title =        "Distributed data processing: New problems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "249--250",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Milor:1988:CSA,
  author =       "G. Will Milor",
  title =        "The computer security act of 1987",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "251--253",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1988:TVF,
  author =       "Jon David",
  title =        "Treating viral fever",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "255--258",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900296",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RLV,
  author =       "Anonymous",
  title =        "Revised list of virus filters",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "259--260",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1988:B,
  author =       "Belden Menkus",
  title =        "Breakpoints",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "261--268",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900314",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "269--270",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900326",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanBiene-Hershey:1988:TEA,
  author =       "Margaret E. van Biene-Hershey",
  title =        "The technical {EDP}-audit function",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "271--277",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900338",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1988:DPC,
  author =       "Fred Cohen",
  title =        "Designing provably correct information networks with
                 digital diodes",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "279--286",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890034X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pluimakers:1988:SNA,
  author =       "G. M. J. Pluimakers",
  title =        "Some notes on authorization and transaction management
                 in distributed database systems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "287--298",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900351",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{VanderBank:1988:CFM,
  author =       "Dirk {Van der Bank} and Edwin Anderssen",
  title =        "Cryptographic figures of merit",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "299--303",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "305--306",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HIT,
  author =       "Anonymous",
  title =        "Highlights of {IFIP TC 11} meeting",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "307--308",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RFN,
  author =       "Dr. Harold Joseph Highland",
  title =        "Report on the fourth national computer security
                 conference: {COMPSEC IV}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "309--311",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900399",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1988:SEC,
  author =       "Dr. Ronald Paans",
  title =        "The second {European} conference on computer audit,
                 control and security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "312--315",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900405",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WSb,
  author =       "Anonymous",
  title =        "What others are saying",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "316--319",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HWN,
  author =       "Esther H. Highland",
  title =        "{HR} 145: {What}'s next",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "320--320",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900442",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RRM,
  author =       "Esther H. Highland",
  title =        "Recent rulings may give states copyright immunity",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "320--320",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SAS,
  author =       "Esther H. Highland",
  title =        "Security act is signed: Copyright Bill backed",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "320--320",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900430",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CSF,
  author =       "Esther H. Highland",
  title =        "Computer security: the federal approach",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "320--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900454",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:BCL,
  author =       "Esther H. Highland",
  title =        "{Brazil} copyright law could thwart pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900478",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CCS,
  author =       "Esther H. Highland",
  title =        "Computer cross sections unite at law conference",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900491",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HLR,
  author =       "Esther H. Highland",
  title =        "Hashing out legal rights",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890051X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:LAL,
  author =       "Esther H. Highland",
  title =        "Long arm of the law",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890048X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NSL,
  author =       "Esther H. Highland",
  title =        "New security law compels federal agencies to act",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900466",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PCN,
  author =       "Esther H. Highland",
  title =        "Personal but not confidential: a new debate over
                 privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--321",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900508",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ASM,
  author =       "Esther H. Highland",
  title =        "{Apple} slaps {Microsoft}, {HP} with copyright suit",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "321--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900521",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ALU,
  author =       "Esther H. Highland",
  title =        "Are {Apple} and {Lotus} unfair?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ELS,
  author =       "Esther H. Highland",
  title =        "Exec liable in software copy case, court rules",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900569",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HBW,
  author =       "Esther H. Highland",
  title =        "{House Bill} would increase 1989 funding for {NBS}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HPMb,
  author =       "Esther H. Highland",
  title =        "{H-P}, {Microsoft} respond to {Apple} copyright suit",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900545",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:IPS,
  author =       "Esther H. Highland",
  title =        "Information property: Some intellectual property
                 aspects of the global information economy",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:LFD,
  author =       "Esther H. Highland",
  title =        "The {``look} and {feel''} debate",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--322",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900533",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CIG,
  author =       "Esther H. Highland",
  title =        "Computer insurance: the gaps",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "322--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900594",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CW,
  author =       "Esther H. Highland",
  title =        "Computer weekly",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900661",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DRP,
  author =       "Esther H. Highland",
  title =        "Disaster recovery planning",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900624",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:LPS,
  author =       "Esther H. Highland",
  title =        "Legal protection of software in the {United Kingdom}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900636",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PAV,
  author =       "Esther H. Highland",
  title =        "{Pentagon} attacks viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900648",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SAC,
  author =       "Esther H. Highland",
  title =        "Secure access control and {MAC}-based signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900600",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TSA,
  author =       "Esther H. Highland",
  title =        "Typical system access control problems and solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VCK,
  author =       "Esther H. Highland",
  title =        "Virus that could kill",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--323",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890065X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NSG,
  author =       "Esther H. Highland",
  title =        "{NSA} suppresses {GAO} report",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "323--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900673",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CBP,
  author =       "Esther H. Highland",
  title =        "Computer backup pools, disaster recovery, and default
                 risk",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900727",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:LS,
  author =       "Esther H. Highland",
  title =        "{LAN} security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900697",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TL,
  author =       "Esther H. Highland",
  title =        "Tangible losses",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900715",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TM,
  author =       "Esther H. Highland",
  title =        "{Tempest} micros",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900685",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:UST,
  author =       "Esther H. Highland",
  title =        "Unprotected symphony tunes up",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--324",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900703",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RBI,
  author =       "Esther H. Highland",
  title =        "Red book includes a metaphysical look at security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "324--325",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900739",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CSU,
  author =       "Esther H. Highland",
  title =        "Computer systems under siege",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "325--325",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900752",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CVS,
  author =       "Esther H. Highland",
  title =        "Computer viruses spread",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "325--325",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900764",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SHV,
  author =       "Esther H. Highland",
  title =        "Software, hardware ``vaccines'' stem threat of deadly
                 computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "325--325",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900776",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SSY,
  author =       "Esther H. Highland",
  title =        "Security and software: Are you fully insured?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "325--325",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900740",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DFC,
  author =       "Esther H. Highland",
  title =        "{DOD} fights off computer virus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "325--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MSC,
  author =       "Esther H. Highland",
  title =        "Microcomputer security and control",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900806",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NEG,
  author =       "Esther H. Highland",
  title =        "New emphasis given to {UNIX} security problems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900818",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SCD,
  author =       "Esther H. Highland",
  title =        "Satellite communications for disaster recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900843",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SCC,
  author =       "Esther H. Highland",
  title =        "{``Safe computing''} catching",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900831",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:UNR,
  author =       "Esther H. Highland",
  title =        "Under new rule, auditors must search out fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890082X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VGB,
  author =       "Esther H. Highland",
  title =        "A virus gives business a chill",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--326",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890079X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CSG,
  author =       "Esther H. Highland",
  title =        "Calamities spark growing field",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "326--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900855",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CCM,
  author =       "Esther H. Highland",
  title =        "Computer crime: {MIS} confronts a cancer",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900909",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:FTI,
  author =       "Esther H. Highland",
  title =        "Fault tolerance increasingly important for {LANS}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900879",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PCB,
  author =       "Esther H. Highland",
  title =        "Planning, consulting boost biometric bill",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900892",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SDS,
  author =       "Esther H. Highland",
  title =        "Structing the data security program",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900910",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SSR,
  author =       "Esther H. Highland",
  title =        "Security systems rescue data from snoopers, user
                 blunders",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900867",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VFR,
  author =       "Esther H. Highland",
  title =        "Voice, finger and retina scans: Can biometrics secure
                 your shop?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--327",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900880",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VEV,
  author =       "Esther H. Highland",
  title =        "{VMSecure}: Enhancing {VM} security and control",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "327--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DCS,
  author =       "Esther H. Highland",
  title =        "{DEC} computer security tactics come into focus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890096X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DDS,
  author =       "Esther H. Highland",
  title =        "Decentralized {DP} sites seen lacking in recovery
                 planning",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900971",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DSF,
  author =       "Esther H. Highland",
  title =        "Disturbance in several forms",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900958",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PQI,
  author =       "Esther H. Highland",
  title =        "Power quality issues smack micro market",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SAP,
  author =       "Esther H. Highland",
  title =        "A sensible approach to protecting your data",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:WAU,
  author =       "Esther H. Highland",
  title =        "What about users should know about {PC} security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--328",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PME,
  author =       "Esther H. Highland",
  title =        "Preventive measures to ensure {PC} data security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "328--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:IDS,
  author =       "Esther H. Highland",
  title =        "An introduction to database security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MPP,
  author =       "Esther H. Highland",
  title =        "Make a plan for {PC} disaster recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PWS,
  author =       "Esther H. Highland",
  title =        "Programmer workstation security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RPB,
  author =       "Esther H. Highland",
  title =        "Reliable power: Beyond the big box",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TSC,
  author =       "Esther H. Highland",
  title =        "Top secret --- Concepts and implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:WTS,
  author =       "Esther H. Highland",
  title =        "When trouble strikes, a {UPS} can save the data",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CMP,
  author =       "Esther H. Highland",
  title =        "{It}'s critical to make {PC} security as flexible as
                 {PCs} themselves",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--330",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890106X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MRO,
  author =       "Esther H. Highland",
  title =        "{MCSC} regs outline basic security level for {PCs}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "330--330",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SBC,
  author =       "Anonymous",
  title =        "Security basics for cable\slash video display
                 radiation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "330--331",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "332--332",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PJ,
  author =       "Anonymous",
  title =        "Pages 228--332 ({June 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "??--??",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:Eb,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "334--334",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905615",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1988:EIC,
  author =       "Frederick Cohen",
  title =        "Ethical issues in computer virus distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "335--336",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905627",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HOC,
  author =       "Harold Joseph Highland",
  title =        "How to obtain a computer virus",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "337--337",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905639",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VAS,
  author =       "Harold Joseph Highland",
  title =        "Are virus attack statistics reliable?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "338--338",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905640",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HR,
  author =       "Harold Joseph Highland",
  title =        "Hackers revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "339--339",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905652",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NVT,
  author =       "Harold Joseph Highland",
  title =        "New video terminal law",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "340--340",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905664",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:EEM,
  author =       "Harold Joseph Highland",
  title =        "Electromagnetic eavesdropping machines for
                 {Christmas}?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "341--341",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905676",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TT,
  author =       "Harold Joseph Highland",
  title =        "Tips on terrorism",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "344--344",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905688",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:IRV,
  author =       "Harold Joseph Highland",
  title =        "Investigating a reported virus attack",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "344--345",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890569X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VFUa,
  author =       "Harold Joseph Highland",
  title =        "Virus filter update",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "345--345",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905706",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:F,
  author =       "Anonymous",
  title =        "Footnote",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "346--346",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905718",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madsen:1988:WMT,
  author =       "C. Wayne Madsen",
  title =        "The world meganetwork and terrorism",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "347--352",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890572X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1988:SRH,
  author =       "Jack Bologna",
  title =        "Selection risks in hiring information systems
                 personnel",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "353--355",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905731",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AD,
  author =       "Harold Joseph Highland",
  title =        "The anatomy of a {DOS} Disk",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "357--360",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905743",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1988:UGA,
  author =       "Belden Menkus",
  title =        "{U.S. Government} agencies belatedly address
                 information system security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "361--366",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905755",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:BVF,
  author =       "Harold Joseph Highland",
  title =        "The brain virus: Fact and fantasy",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "367--370",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905767",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "371--372",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905779",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Summers:1988:PAK,
  author =       "Rita C. Summers and Stanley A. Kurzban",
  title =        "Potential applications of knowledge-based methods to
                 computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "373--385",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905780",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McHugh:1988:MSI,
  author =       "John McHugh and Bhavani M. Thuraisingham",
  title =        "Multilevel security issues in distributed database
                 management systems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "387--396",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905792",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Witten:1988:PAA,
  author =       "Ian H. Witten and John G. Cleary",
  title =        "On the privacy afforded by adaptive text compression",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "397--408",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905809",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1988:TSF,
  author =       "Fred Cohen and Stephen Bruhns",
  title =        "Two secure file servers",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "409--414",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905810",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "415--416",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905822",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:WWRc,
  author =       "Anonymous",
  title =        "World-wide reports on developments in computer
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "417--422",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905834",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AFR,
  author =       "Esther H. Highland",
  title =        "{Apple} files response to {Microsoft}'s countersuit:
                 Laurie Flynn {InfoWorld}, {May} 2, 1988, p. 5",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890586X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AMSa,
  author =       "Esther H. Highland",
  title =        "{Apple\slash Microsoft} suit split in two: {Rachel
                 Parker, InfoWorld, May 23, 1988, p. 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905883",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AMSb,
  author =       "Esther H. Highland",
  title =        "{Apple--Microsoft} suit raises issue of vague copyright
                 laws: {Robert Francis, Datamation, May 15, 1988, pp.
                 22, 26}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905895",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RDM,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Dispute over Mac user interface
                 longstanding}}: Stuart J. Johnston, InfoWorld, April
                 25, 1988, p. 33}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905858",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RMC,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Microsoft charges Apple with
                 breach of contract}}: Stuart J. Johnston and Rachel
                 Parker InfoWorld, April 11, 1988, pp. 1, 81}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905846",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MSSa,
  author =       "Esther H. Highland",
  title =        "{Microsoft} seeks to split {Apple} suit into two
                 phases: {Rachel Parker, InfoWorld, May 23, 1988, p.
                 5}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--423",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905871",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MOO,
  author =       "Esther H. Highland",
  title =        "{MBS}, {OPM} officials plan broad security guidelines:
                 {Kevin Power, Government Computer News, May 13, 1988,
                 pp. 1, 92}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "423--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905901",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ARF,
  author =       "Esther H. Highland",
  title =        "Agencies ready forces for data security campaign:
                 {Robert V. Head, Government Computer News, May 27,
                 1988, pp. 27, 31}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905913",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CIK,
  author =       "Esther H. Highland",
  title =        "Computer insecurity: {Ken McLeod, Information Age,
                 April 1988, pp. 89--93}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905962",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RRO,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Reliance on optical fibres to
                 increase telecommunication security}}: Alan H.
                 Friedberg, Robert M. Harper and Michael J. Cerullo,
                 Information Age, April 1988, pp. 73--78}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905937",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SCN,
  author =       "Esther H. Highland",
  title =        "Smart cards: a new tool for identification and access
                 protection: {Rola Krayem, Information Age, April 1988,
                 pp. 85--88}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905950",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SOD,
  author =       "Esther H. Highland",
  title =        "Security, {OSI} and distributed systems: {T. Knowles
                 Information Age, April 1988, pp. 79--84}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905949",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RUS,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Unix system security issues}}:
                 Michael J. Knox and Edward D. Bowden, Information Age,
                 April, 1988, pp. 67--72}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905925",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RUU,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{UFS: User-friendly security}}:
                 Alan R. Krull Computer Control Quarterly, Spring 1988,
                 pp. 1--9}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--424",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905974",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:REG,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{The executives guide to
                 workstation management and data security}}: Mark Goode
                 Computer Control Quarterly, Spring 1988, pp. 10--17}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "424--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905986",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CWT,
  author =       "Esther H. Highland",
  title =        "Can we trust computers?: {Andrew M. Lister, Computer
                 Control Quarterly, Spring 1988, pp. 31--35}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906001",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:IHD,
  author =       "Esther H. Highland",
  title =        "Insurance and the hacker: {David Davies, Computer
                 Control Quarterly, Spring 1988, pp. 28--30}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905998",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MSR,
  author =       "Esther H. Highland",
  title =        "Media security: {Ralph M. Smole, Computer Control
                 Quarterly, Spring 1988, pp. 36--37}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MVSa,
  author =       "Esther H. Highland",
  title =        "{Mac} virus surfaces in {Washington}: {Nick Arnett
                 InfoWorld, April 11, 1988, pp. 1, 3}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NBE,
  author =       "Esther H. Highland",
  title =        "A nasty bug: Editorial {Computerworld, April 4, 1988,
                 p. 18}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RNV,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{New virus damaging Mac data,
                 group says}}: Scott Mace InfoWorld, April 11, 1988, p.
                 29}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--425",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SEG,
  author =       "Esther H. Highland",
  title =        "Security expert gives advice on computer viruses: {Tim
                 McGraw, Government Computer News, April 15, 1988, p.
                 17}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "425--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ARAa,
  author =       "Esther H. Highland",
  title =        "{Apple} releases ``anti-viral'' program: {Nick Arnett
                 InfoWorld, May 2, 1988, p. 8}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CVC,
  author =       "Esther H. Highland",
  title =        "Computer viruses can infect entire organizations:
                 {Angel L. Rivera, Government Computer News, April 29,
                 1988, pp. 37, 43}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:FOP,
  author =       "Esther H. Highland",
  title =        "{Federal} officials puzzled by computer virus attacks:
                 {Neil Munro and Richard A. Dance, Government Computer
                 News, April 29, 1988, p. 89}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MVD,
  author =       "Esther H. Highland",
  title =        "{Mac} virus discovered at {EPA}, vaccination called
                 successful: {Richard A. Danca, Government Computer
                 News, May 13, 1988, p. 4}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MVSb,
  author =       "Esther H. Highland",
  title =        "{Macintosh} virus seeks {EDS} signatures: {Nick Arnett
                 InfoWorld, April 25, 1988, p. 8}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--426",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SHB,
  author =       "Esther H. Highland",
  title =        "Security habits build healthy software: {David J.
                 Stang, Government Computer News, May 27, 1988, p. 53}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "426--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RSCb,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{Spread of computer viruses
                 worries users}}: John Voelcher The Institute, IEEE
                 Spectrum, June 1988, p. 1 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906177",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RCG,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Confronting the growing threat of
                 harmful computer software viruses}}: Jim Seymour and
                 Jonathan Matzkin PC Magazine, June 28, 1988, pp.
                 33--35}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HBC,
  author =       "Esther H. Highland",
  title =        "The hype behind computer viruses: Their bark may be
                 worse than their ``byte'': {Paul Karon PC Week, May 31,
                 1988, pp. 49, 53}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890613X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HVP,
  author =       "Esther H. Highland",
  title =        "How vaccine programs work: {Neil J. Rothenberg, PC
                 Magazine, June 28, 1988, p. 35}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906165",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VIC,
  author =       "Esther H. Highland",
  title =        "Viruses infect corporate {MIS}: {Alan J. Ryan,
                 Computerworld, May 30, 1988, pp. 29, 31}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VPU,
  author =       "Esther H. Highland",
  title =        "Virus-plagued user warned of snake-oil pitch: {Robert
                 L. Scheirer, PC Week, May 10, 1988, p. 170}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--427",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906141",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:OAC,
  author =       "Esther H. Highland",
  title =        "{OMB} advocates control model for systems security:
                 {Kevin Power, Government Computer News, March 18, 1988,
                 p. 21}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "427--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906189",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HME,
  author =       "Esther H. Highland",
  title =        "How much is enough? {Expert} says security efforts
                 should pay, not cost: {William Murray, Computerworld
                 Focus, April 6, 1988, p. 30 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:HSY,
  author =       "Esther H. Highland",
  title =        "How safe is your data: {Joseph} M. Pujals Information
                 Center, {April} 1988, p. 46",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906219",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ICH,
  author =       "Esther H. Highland",
  title =        "It can't happen here: {Patricia Keefe, Computerworld
                 Focus, April 6, 1988, pp. 13--16}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906244",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RPAa,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Problems in auditing expert
                 system development}}: Wayne J. Socha, Edpacs, March
                 1988, pp. 1--6}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906190",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RSC,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Security concerns in a local area
                 network environment}}: Michael I. Sobol,
                 Telecommunications, March 1988, p. 96 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906207",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SCP,
  author =       "Esther H. Highland",
  title =        "{SPA} cracks down on piracy, raids computer retailer:
                 {Nick Arnett InfoWorld, April 4, 1988, p. 6}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--428",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RBR,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Breach reported in U.S.
                 computers}}: John Markoff, The New York Times, April
                 18, 1988, pp. A1, A19}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "428--429",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MPW,
  author =       "Esther H. Highland",
  title =        "Monitoring points out weak spots: {Gardner Terrell,
                 Government Computer News, April 29, 1988, pp. 1, 88}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "429--429",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906268",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RTF,
  author =       "Esther H. Highland",
  title =        "Risk! {The} third factor: {Paul Tate, Datamation,
                 April 15, 1988, p. 58 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "429--429",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SPG,
  author =       "Esther H. Highland",
  title =        "Security problems greater than ever: {Barbara Bates,
                 Information WEEK, April 18, 1988, p. 48}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "429--429",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SWH,
  author =       "Esther H. Highland",
  title =        "Stalking the Wily Hacker: {Clifford Stoll,
                 Communications of the ACM, May 1988, pp. 484--497}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "429--429",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890627X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TCT,
  author =       "Esther H. Highland",
  title =        "Tough countermeasures thwart hackers who attack vital
                 data: {Ram Pemmaraju, Computer Technology Review, April
                 1988, p. 8 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "429--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890630X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:AFA,
  author =       "Esther H. Highland",
  title =        "Agencies fail to appreciate threat to data security:
                 {Belden Menkus, Government Computer New, April 29,
                 1988, p. 36}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906347",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RLM,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Loose MIPS sink ships}}: W. Mark
                 Goode, Government Data Systems, April 1988, pp.
                 12--13}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906335",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:LSP,
  author =       "Esther H. Highland",
  title =        "{LAN} security problem detected on {Navy} ships: {Brad
                 Bass, Government Computer News, April 1, 1988, pp. 1,
                 84}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906323",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TSV,
  author =       "Esther H. Highland",
  title =        "Top secret, and vulnerable: {John Markoff, The New
                 York Times, April 25, 1988, pp. D1, D4}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906311",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:OSW,
  author =       "Esther H. Highland",
  title =        "Operating system is weak link in {MVS} security:
                 {Brian Currah, Government Computer News, April 29,
                 1988, p. 44}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906359",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:DRM,
  author =       "Esther H. Highland",
  title =        "Despite regs, most agencies lack disaster plan: {Tari
                 Schreider, Government Computer News, April 29, 1988, p.
                 54}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906402",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:MSSb,
  author =       "Esther H. Highland",
  title =        "Micro security system effective even on laptops:
                 {Peter Stevenson, Government Computer News, April 29,
                 1988, p. 48}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906384",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:NRH,
  author =       "Esther H. Highland",
  title =        "{NSA} regs hinder inexpensive network security:
                 {Barbara Bates, Government Computer News, April 29,
                 1988, pp. 50, 54}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906396",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PEM,
  author =       "Esther H. Highland",
  title =        "Picking encryption method is no time for secrets:
                 {Harold Joseph Highland, Government Computer News,
                 April 29, 1988, p. 39}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906360",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RPP,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Proper procedures are final
                 security safeguard}}: Christine E. Howkins, Government
                 Computer News, April 29, 1988, p. 40}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906372",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RRC,
  author =       "Esther H. Highland",
  title =        "A redundancy reducing cipher: {Peter Wayner,
                 Cryptologia, April 1988, pp. 107--112}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906414",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:FKC,
  author =       "Esther H. Highland",
  title =        "Fire {KOs} {Chicago} networks: {Jean S. Bozman,
                 Computerworld, May 16, 1988, pp. 1, 121}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906451",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RLR,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Lotus removes 1--2--3
                 protection}}: Douglas Barney, Computerworld, May 16,
                 1988, p. 5}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890644X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RPAb,
  author =       "Esther H. Highland",
  title =        "Review: {{\booktitle{Planning averts disaster at L.A.
                 Bond trading firm}}: James A. Martin, Computerworld,
                 May 9, 1988, p. 4}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906463",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SSE,
  author =       "Esther H. Highland",
  title =        "Speakers say employee attitude is key to security:
                 {Kevin Power, Computerworld, May 13, 1988, p. 14}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TIE,
  author =       "Esther H. Highland",
  title =        "Taming the indoor elements: {Nina Frank, Digital
                 Review, May 16, 1988, pp. 91--93}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906475",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TMS,
  author =       "Esther H. Highland",
  title =        "Technology makes security of voice and data against
                 sabotage both effective and affordable: {Paul Kirvan,
                 Communications News, May 1988, pp. 82--83}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906438",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CSN,
  author =       "Esther H. Highland",
  title =        "Computer systems need isolated ground that is safe and
                 noise free: {Thomas M. Gruzs, Computer Technology
                 Review, Spring 1988, p. 103 ff}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "432--433",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906487",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:APb,
  author =       "Anonymous",
  title =        "Addresses of publications",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "433--433",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906505",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ITD,
  author =       "Esther H. Highland",
  title =        "Information technology and dataveillance: {Roger A.
                 Clarke, Communications of the ACM, May 1988, pp.
                 498--512}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "433--433",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906499",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "435--435",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906517",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PAb,
  author =       "Anonymous",
  title =        "Pages 334--435 ({August 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "??--??",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:Ec,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "438--438",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901897",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:UCC,
  author =       "Harold Joseph Highland",
  title =        "{U.S. Congress} computer virus report",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "439--439",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:WPT,
  author =       "Harold Joseph Highland",
  title =        "Write-protect tab warning",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "439--439",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VFE,
  author =       "Harold Joseph Highland",
  title =        "Virus filter evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "440--440",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:VFUb,
  author =       "Harold Joseph Highland",
  title =        "Virus filter update",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "441--442",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901939",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:CVM,
  author =       "Harold Joseph Highland",
  title =        "Computer viruses: Media hyperbole, errors and
                 ignorance",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "442--450",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901940",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Glath:1988:CGV,
  author =       "Raymond M. Glath",
  title =        "The case of the {``Gerbil virus''} that wasn't",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "451--453",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901952",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1988:CIS,
  author =       "Charles Cresson Wood",
  title =        "A context for information systems security planning",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "455--465",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901964",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schweitzer:1988:SNB,
  author =       "Jim Schweitzer",
  title =        "Security news briefs",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "467--469",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1988:VSW,
  author =       "Bernard P. Zajac",
  title =        "Viruses: Should we quit talking about them?",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "471--472",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "473--474",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890199X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1988:PPT,
  author =       "John M. Carroll and Robert B. Mowat and Lynda E.
                 Robbins and David Wiseman",
  title =        "The password predictor --- a training aid for raising
                 security awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "475--481",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:1988:SMS,
  author =       "Chris Mitchell and Michael Walker",
  title =        "Solutions to the multidestination secure electronic
                 mail problem",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "483--488",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1988:MPP,
  author =       "Fred Cohen",
  title =        "Maintaining a poor person's information integrity",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "489--494",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfleeger:1988:TFA,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger",
  title =        "A transaction flow approach to software security
                 certification for document handling systems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "495--502",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:1988:SWP,
  author =       "Yue Jiang Huang and Fred Cohen",
  title =        "Some weak points of one fast cryptographic checksum
                 algorithm and its improvement",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "503--505",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "507--508",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CISa,
  author =       "Anonymous",
  title =        "Computer information security and protection. {June
                 1985--April 1987} (Citations from the {NTIS}
                 database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "509--509",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zaritsky:1988:MSI,
  author =       "I. S. Zaritsky",
  title =        "Microcomputer security issues in an office
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "509--509",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tonn:1988:AIR,
  author =       "B. E. Tonn and C. B. Travis and L. Arrowood and R.
                 Goeltz and C. A. Mann",
  title =        "Analysis of individual risk belief structures",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "509--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CDP,
  author =       "Anonymous",
  title =        "Computer disasters: Prevention and recovery.
                 {1975--September 1986} (Citations from the {INSPEC:
                 Information Services for the Physics and Engineering
                 Communities} Database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890209X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Burnham:1988:DES,
  author =       "B. Burnham",
  title =        "{DES} (Data Encryption Standard) cryptographic
                 services designed for the {DOE} wide band
                 communications network",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890212X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peercy:1988:RAM,
  author =       "D. E. Peercy and M. D. Estill and K. L. Shaw",
  title =        "Risk Assessment Methodology for Software
                 Supportability {(RAMSS)}: {User}'s handbook",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peercy:1988:SSR,
  author =       "D. E. Peercy and W. Huebner and M. D. Estill and J. C.
                 Wu",
  title =        "Software supportability risk assessment in {OT\&E}
                 (Operational Test and Evaluation): Historical baselines
                 for risk profiles. Volumes 1 and 2",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jung:1988:IRC,
  author =       "A. Jung",
  title =        "Implementing the {RSA} cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CISb,
  author =       "Anonymous",
  title =        "Computer information security and protection.
                 {November 1986--October 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CPE,
  author =       "Anonymous",
  title =        "Computer performance evaluation. {July 1983--April
                 1988} (citations from the {NTIS} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DESa,
  author =       "Anonymous",
  title =        "{Data Encryption Standard. January 1975--January 1988
                 (citations from the INSPEC: Information Services for
                 the Physics and Engineering Communications Database)}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DESb,
  author =       "Anonymous",
  title =        "Data encryption standard. {1975--January 1987}
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} Database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SSV,
  author =       "Anonymous",
  title =        "Secure software verification tools",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gaglione:1988:ITP,
  author =       "A. M. Gaglione",
  title =        "Information theory and public key cryptosystems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IPRa,
  author =       "Anonymous",
  title =        "Intellectual property rights in an age of electronics
                 and information. {Contractor} documents. {Volume} 1",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890226X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MDS,
  author =       "Anonymous",
  title =        "Microcomputers: Data and software security.
                 {1974--February 1987} (citations from the {INSPEC}:
                 {Information Services for the Physics and Engineering
                 Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MML,
  author =       "Anonymous",
  title =        "Microcomputer to mainframe links. {January
                 1975--February 1988} (citations from the {INSPEC:
                 Information Services for the Physics and Engineering
                 Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baum:1988:ESS,
  author =       "William E. Baum and Judith H. Podell and G. N.
                 Romstedt",
  title =        "Expert system for software quality assurance",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902258",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1988:UCE,
  author =       "H. David and J. Roelofsen",
  title =        "Use of colour on electronic data displays (second
                 study)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherman:1988:CVV,
  author =       "A. T. Sherman",
  title =        "Cryptology and {VLSI (Very Large Scale Integration)}.
                 {I}. {Detecting} and exploiting algebraic weaknesses in
                 cryptosystems. {II}. {Algorithms} for placing modules
                 on a custom {VLSI} chip",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Villarreal:1988:IW,
  author =       "J. Villarreal",
  title =        "Innovative workstation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allen:1988:DAR,
  author =       "Bruce M. Allen",
  title =        "Data acquisition, reduction, and analysis using a
                 microcomputer",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCJa,
  author =       "Anonymous",
  title =        "Computer crime. {January 1975--October 1986}
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCN,
  author =       "Anonymous",
  title =        "Computer crime. {November 1986--October 1987}
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IPRb,
  author =       "Anonymous",
  title =        "Intellectual property rights in an age of electronics
                 and information. {Contractor} documents. {Volume} 2",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SSP,
  author =       "Anonymous",
  title =        "Software security and piracy. {February 1984--March
                 1986} (citations from the {INSPEC: Information Services
                 for the Physics and Engineering Communities}
                 database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902325",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Braum:1988:SCD,
  author =       "H. Braum",
  title =        "Security considerations --- defence-related and
                 commercial",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--513",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Malkoff:1988:RTF,
  author =       "D. B. Malkoff",
  title =        "Real-time fault detection and diagnosis: the use of
                 learning expert systems to handle the timing of
                 events",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "513--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:MMF,
  author =       "Anonymous",
  title =        "Microcomputer modems. {1975--February 1987} (citations
                 from the {INSPEC: Information Services for the Physics
                 and Engineering Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Linn:1988:TOO,
  author =       "R. J. Linn and J. S. Nightingale",
  title =        "Testing {OSI (Open Systems Interconnection)} protocols
                 at the {National Bureau of Standards}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lundberg:1988:CCA,
  author =       "B. G. Lundberg",
  title =        "{CONST} --- a constructive approach to information
                 modelling",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902362",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Snyder:1988:DQS,
  author =       "C. E. Snyder",
  title =        "Data quality: a strategic perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902350",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tanca:1988:EES,
  author =       "L. Tanca and S. Ceri",
  title =        "{ELAND}: an expert system for the configuration of
                 local area networks applications",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--514",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CNS,
  author =       "Anonymous",
  title =        "Computer network standards. {1975--February 1987}
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "514--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ECN,
  author =       "Anonymous",
  title =        "{Ethernet} communication networks. 1978-1986
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:LAN,
  author =       "Anonymous",
  title =        "Local area networks. {January 1986--December 1986}
                 (citations from the engineering index database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890243X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:1988:CCR,
  author =       "A. A. Chien",
  title =        "Congestion control in routing networks",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Frankel:1988:GSP,
  author =       "S. Frankel",
  title =        "Guidance on software package selection",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Greene:1988:STAa,
  author =       "Joseph S. Greene and T. Probert and W. Riddle and C.
                 Giese and T. L. Quindry",
  title =        "Software Technology for Adaptable, Reliable Systems
                 {(STARS)} program management plan",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kimball:1988:CCF,
  author =       "Mary C. Kimball",
  title =        "Central computer facility software directory",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--515",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Greene:1988:STAb,
  author =       "Joseph S. Greene and T. Probert and W. Riddle and C.
                 Giese and T. L. Quindry",
  title =        "Software Technology for Adaptable, Reliable Systems
                 {(STARS)} technical program plan",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "515--516",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mueller-Boeling:1988:ISB,
  author =       "D. Mueller-Boeling",
  title =        "{Informationstechnik aus der Sicht der Benutzer im
                 Wandel des letzten Jahrezehnts} ({Information}
                 technology from the point of the user during the last
                 decade)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "516--516",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nicholson:1988:MDA,
  author =       "W. L. Nicholson and P. J. Cowley and D. B. Carr and M.
                 A. Whiting",
  title =        "Managing the data analysis process",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "516--516",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Osborne:1988:ABS,
  author =       "W. M. Osborne and R. Raigrodski",
  title =        "Annotated bibliography on software maintenance",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "516--516",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wong:1988:MOS,
  author =       "W. Wong",
  title =        "Management overview of software reuse",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "516--516",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hurford:1988:UUA,
  author =       "J. M. Hurford and C. A. Ramsey",
  title =        "Understanding user attitudes: the cornerstone of
                 computer documentation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "516--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SQMa,
  author =       "Anonymous",
  title =        "Software quality and metrics. {January 1975--December
                 1986} (citations from the {INSPEC: Information Services
                 for the Physics and Engineering Communities}
                 database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890257X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holt:1988:SEE,
  author =       "H. M. Holt",
  title =        "Software error experiment",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kiefhaber:1988:NSW,
  author =       "A. Kiefhaber",
  title =        "National survey of worksite health promotion programs,
                 1985",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kolodner:1988:RUV,
  author =       "E. K. Kolodner",
  title =        "Recovery using virtual memory",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miller:1988:GPS,
  author =       "D. F. Miller",
  title =        "Guidelines for preparing software user documentation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Requa:1988:WMC,
  author =       "J. Requa",
  title =        "Workstation\slash mainframe connection",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--517",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902556",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SQMb,
  author =       "Anonymous",
  title =        "Software quality and metrics. {January 1987--December
                 1987} (citations from the {INSPEC: Information Services
                 for the Physics and Engineering Communities}
                 database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "517--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902581",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCJb,
  author =       "Anonymous",
  title =        "Cryptography and cryptosystems. {January
                 1987--December 1987} (citations from the {INSPEC:
                 Information Services for the Physics and Engineering
                 Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CSM,
  author =       "Anonymous",
  title =        "Computer software maintenance. {January 1970--August
                 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902635",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CST,
  author =       "Anonymous",
  title =        "Computer software transferability and portability.
                 {January 1970--August 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CVR,
  author =       "Anonymous",
  title =        "Computer voice recognition: Market aspects. {January
                 1983--July 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCTb,
  author =       "Anonymous",
  title =        "Data compression: Techniques and applications.
                 {October 1983--September 1986}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:HRC,
  author =       "Anonymous",
  title =        "Handwriting recognition by computer. {January
                 1970--August 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Voigt:1988:DRT,
  author =       "R. J. Voigt",
  title =        "Design of a real time operating system for a fault
                 tolerant microcomputer",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890260X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SCJ,
  author =       "Anonymous",
  title =        "Smart cards. {January 1983--August 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCJc,
  author =       "Anonymous",
  title =        "Cryptography and cryptosystems. {January 1970--October
                 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902738",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCD,
  author =       "Anonymous",
  title =        "Directory of computerized data files, 1987",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCTc,
  author =       "Anonymous",
  title =        "Data compression: Techniques and applications.
                 {October 1983--September 1986}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902684",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DCTd,
  author =       "Anonymous",
  title =        "Data compression: Techniques and applications.
                 {October 1986--September 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902696",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ESNb,
  author =       "Anonymous",
  title =        "Expert systems: Non-industrial applications. {January
                 1984--March 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902702",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ICM,
  author =       "Anonymous",
  title =        "{IC} card with a microprocessor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902726",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gaglione:1988:SCT,
  author =       "A. M. Gaglione",
  title =        "Some complexity theory for cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902714",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCSb,
  author =       "Anonymous",
  title =        "Computer communications software. {January
                 1975--October 1986}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--520",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890274X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCSc,
  author =       "Anonymous",
  title =        "Computer communications software. {November
                 1986-September 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "520--520",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902751",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:NCA,
  author =       "Anonymous",
  title =        "Neutral computers, auditing and security",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "520--520",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902763",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Byles:1988:LFD,
  author =       "Torrey Byles",
  title =        "``Look-and-feel'' decision looms",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--521",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902775",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goff:1988:HPC,
  author =       "Leslie Goff",
  title =        "{H-P} countersues {Apple}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--521",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902817",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Grimm:1988:BRD,
  author =       "Vanessa Jo Grimm",
  title =        "Bill to regulate data matching moves to floor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--521",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902799",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1988:MHP,
  author =       "Stephen Jones",
  title =        "{Microsoft}, {H-P} shrug off {Apple} suit",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--521",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902805",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1988:IPC,
  author =       "Rachel Parker",
  title =        "Industry praises copyright decision",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--521",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902787",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Richman:1988:APR,
  author =       "Sheldon L. Richman",
  title =        "{Apple} property rights suit can backfire",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "521--522",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902829",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barker:1988:UCS,
  author =       "Paul Barker",
  title =        "{Unisys Canada} slaps \$500 K lawsuit on firm",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "522--522",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902830",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bridges:1988:CVS,
  author =       "Linda Bridges",
  title =        "Computer viruses strike colleges and companies,
                 leaving them defensive",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "522--522",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902866",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lewis:1988:CIB,
  author =       "Brenda D. Lewis",
  title =        "Copyright issue blurs",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "522--522",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902854",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Raab:1988:PCM,
  author =       "Selwyn Raab",
  title =        "Police chief of Metro-{North} indicted in computer
                 misuse",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "522--522",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902842",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SAC,
  author =       "Anonymous",
  title =        "Sabotage aimed at computer company destroys government
                 data",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "522--523",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902878",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1988:SML,
  author =       "Rachel Parker",
  title =        "Scent of money lures firms to jump on antiviral
                 bandwagon",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "523--523",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890288X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PO,
  author =       "Anonymous",
  title =        "Pages 438--530 ({October 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "??--??",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:Ed,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "532--532",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RBB,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "533--541",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stoll:1988:HSC,
  author =       "Cliff Stoll",
  title =        "How secure are computers in the {U.S.A.}?: an analysis
                 of a series of attacks on {Milnet} computers",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "543--547",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890003X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1988:UPC,
  author =       "Belden Menkus",
  title =        "Understanding password compromise",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "549--552",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1988:SWC,
  author =       "Jack Bologna",
  title =        "{Soviet} white-collar crime and criminal justice",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "553--556",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "557--558",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:1988:CSP,
  author =       "Jan H. P. Eloff",
  title =        "Computer security policy: Important issues",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "559--562",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1988:IMS,
  author =       "John M. Carroll",
  title =        "Implementing multilevel security by violation
                 privilege",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "563--573",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Biskup:1988:PMD,
  author =       "Joachim Biskup and Hans Hermann Br{\"u}ggeman",
  title =        "The personal model of data:: Towards a
                 privacy-oriented information system",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "575--597",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1988:NCA,
  author =       "Ravinderpal Singh Sandhu",
  title =        "Nested categories for access control",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "599--605",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "607--608",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:ARAb,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "609--615",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "616--616",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:AIV,
  author =       "Anonymous",
  title =        "Author index to volume 7",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "617--618",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:SIV,
  author =       "Anonymous",
  title =        "Subject index to volume 7",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "619--619",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:PD,
  author =       "Anonymous",
  title =        "Pages 532--619 ({December 1988})",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "6",
  pages =        "??--??",
  month =        dec,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Ea,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "3--13",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990031X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1989:POP,
  author =       "Rolf Moulton and Robert P. Bigelow",
  title =        "Protecting ownership of proprietary information",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "15--21",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoffman:1989:RAC,
  author =       "Lance J. Hoffman",
  title =        "Risk analysis and computer security: Towards a theory
                 at last",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "23--24",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1989:LOC,
  author =       "Bernard P. Zajac",
  title =        "Legal options to computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "25--27",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1989:OMF,
  author =       "Jack Bologna",
  title =        "The one minute fraud auditor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "29--31",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "33--34",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gleissner:1989:MTS,
  author =       "Winfried Gleissner",
  title =        "A mathematical theory for the spread of computer
                 viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "35--41",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lunt:1989:ACP,
  author =       "Teresa F. Lunt",
  title =        "Access control policies: Some unanswered questions",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "43--54",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:1989:RHF,
  author =       "Chris Mitchell and Dave Rush and Michael Walker",
  title =        "A remark on hash functions for message
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "55--58",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Feuerlicht:1989:RCI,
  author =       "J. Feuerlicht and P. Grattan",
  title =        "The role of classification of information in
                 controlling data proliferation in end-user personal
                 computer environment",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "59--66",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "67--68",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:SAS,
  author =       "Anonymous",
  title =        "Special abstract: Study of computer ``viruses'' and
                 their potential for infecting {Commonwealth} computer
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "69--71",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:WSa,
  author =       "Anonymous",
  title =        "What others are saying",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "72--73",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAa,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "74--82",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "83--83",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990045X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PF,
  author =       "Anonymous",
  title =        "Pages 2--83 ({February 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Eb,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "86--86",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990059X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:LE,
  author =       "Anonymous",
  title =        "Letters to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "87--90",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900606",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "91--100",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RV,
  author =       "Harold Joseph Highland",
  title =        "Reports from the victims",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "101--101",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990062X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Webster:1989:UDP,
  author =       "Anne E. Webster",
  title =        "{University} of {Delaware} and the {Pakistani}
                 computer virus",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "103--105",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanWyk:1989:LV,
  author =       "Kenneth R. van Wyk",
  title =        "The {Lehigh} virus",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "107--110",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Radai:1989:IPV,
  author =       "Yisrael Radai",
  title =        "The {Israeli PC} virus",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "111--113",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1989:CVS,
  author =       "Belden Menkus",
  title =        "The computer virus situation is not encouraging",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "115--119",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900667",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "121--122",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Weber:1989:CEF,
  author =       "Ron Weber",
  title =        "Controls in electronic funds transfer systems: a
                 survey and synthesis",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "123--137",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruys:1989:SOS,
  author =       "Jan P. Kruys",
  title =        "Security of open systems",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "139--147",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900692",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1989:MPD,
  author =       "Fred Cohen",
  title =        "Models of practical defenses against computer
                 viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "149--160",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "161--162",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900710",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAb,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "163--172",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "173--173",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900734",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PAa,
  author =       "Anonymous",
  title =        "Pages 86--173 ({April 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Ec,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "176--177",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "178--188",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901004",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1989:PMA,
  author =       "Charles Cresson Wood",
  title =        "Planning: a means to achieve data communications
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "189--199",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1989:PSS,
  author =       "Belden Menkus",
  title =        "Physical security: Selecting an access control
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "201--205",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "207--207",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990103X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shain:1989:SEF,
  author =       "M. Shain",
  title =        "Security in electronic funds transfer: Message
                 integrity in money transfer and bond settlements
                 through {GE} information services' global network",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "209--221",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Keenan:1989:EVO,
  author =       "Thomas P. Keenan",
  title =        "Emerging vulnerabilities in office automation
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "223--227",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thomsen:1989:PEM,
  author =       "D. J. Thomsen and W. T. Tsai and M. B.
                 Thuraisingham",
  title =        "Prototyping to explore {MLS\slash DBMS} design",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "229--245",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fifield:1989:SOC,
  author =       "Ken J. Fifield",
  title =        "{Smartcards} outsmart computer crime",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "247--255",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "257--258",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAc,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "259--269",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "270--270",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889901107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PM,
  author =       "Anonymous",
  title =        "Pages 176--270 ({May 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Ed,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "272--273",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900850",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "274--282",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900862",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jamieson:1989:SCI,
  author =       "Rodger Jamieson and Graham Low",
  title =        "Security and control issues in local area network
                 design",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "283--290",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mollema:1989:PDC,
  author =       "Kor IJ. Mollema and Ad P. M. Smulders",
  title =        "Prerequisites for data control",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "291--296",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1989:CAC,
  author =       "Fred Cohen",
  title =        "Computational aspects of computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "297--298",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "299--302",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{White:1989:VWC,
  author =       "Clinton E. White",
  title =        "Viruses and worms: a campus under attack",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "303--303",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gardner:1989:IWW,
  author =       "Phillip E. Gardner",
  title =        "The {Internet} worm: What was said and when",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "305--316",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1989:DRY,
  author =       "Bernard P. Zajac",
  title =        "Disaster recovery --- are you really ready?",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "317--323",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990093X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoffman:1989:SBA,
  author =       "Lance J. Hoffman",
  title =        "Smoking out the bad actors: Risk analysis in the age
                 of the microcomputer",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "325--344",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "345--346",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:WSb,
  author =       "Anonymous",
  title =        "What others are saying",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "347--352",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAd,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "353--361",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "363--363",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900989",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PJ,
  author =       "Anonymous",
  title =        "Pages 272--363 ({June 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Ee,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "366--367",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "369--380",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeMaio:1989:VMI,
  author =       "Harry B. DeMaio",
  title =        "Viruses --- a management issue",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "381--388",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1989:TRD,
  author =       "Belden Menkus",
  title =        "{It}'s time to rethink data processing fire
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "389--394",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1989:TTR,
  author =       "G. J. Bologna",
  title =        "Twenty-two reasons why {MIS} subordinates don't
                 measure up to their bosses' expectations",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "395--396",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "397--397",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Burk:1989:DPS,
  author =       "Holger B{\"u}rk and Andreas Pfitzmann",
  title =        "Digital payment systems enabling security and
                 unobservability",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "399--416",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boshoff:1989:PCM,
  author =       "W. H. Boshoff and S. H. von Solms",
  title =        "A path context model for addressing security in
                 potentially non-secure environments",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "417--425",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wiseman:1989:PVC,
  author =       "Simon Wiseman",
  title =        "Preventing viruses in computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "427--432",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Badenhorst:1989:FML,
  author =       "K. P. Badenhorst and Jan H. P. Eloff",
  title =        "Framework of a methodology for the life cycle of
                 computer security in an organization",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "433--442",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "443--444",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAe,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "445--455",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "456--456",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990028X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PAb,
  author =       "Anonymous",
  title =        "Pages 366--456 ({August 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highlands:1989:E,
  author =       "Harold Joseph Highlands",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "458--459",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900746",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "460--478",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gardner:1989:EFR,
  author =       "Phillip E. Gardner",
  title =        "Evaluation of five risk assessment programs",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "479--485",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990076X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1989:ERP,
  author =       "Belden Menkus",
  title =        "The employee's role in protecting information assets",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "487--492",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900771",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "493--493",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900783",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harrold:1989:ISA,
  author =       "C. L. Harrold",
  title =        "An introduction to the {SMITE} approach to secure
                 computing",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "495--505",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramaswamy:1989:PDI,
  author =       "Raju Ramaswamy",
  title =        "Placement of data integrity security services in open
                 systems interconnection architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "507--516",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Keefe:1989:SSO,
  author =       "T. F. Keefe and W. T. Tsai and M. B. Thuraisingham",
  title =        "{SODA}: a secure object-oriented database system",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "517--533",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "535--536",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:ARAf,
  author =       "Esther H. Highland",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "537--546",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "547--548",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PO,
  author =       "Anonymous",
  title =        "Pages 458--548 ({October 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "6",
  pages =        "??--??",
  month =        oct,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:E,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "550--552",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "553--561",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:SDI,
  author =       "Harold Joseph Highland",
  title =        "Secret disk {II} --- administrator",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "563--568",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Riddle:1989:PUU,
  author =       "Bruce L. Riddle and Murray S. Miron and Judith A.
                 Semo",
  title =        "Passwords in use in a university timesharing
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "569--579",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1989:CRF,
  author =       "Belden Menkus",
  title =        "Computer-related fire problems revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "581--586",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jobusch:1989:SPMa,
  author =       "David L. Jobusch and Arthur E. Oldehoeft",
  title =        "A survey of password mechanisms: Weaknesses and
                 potential {improvements.Part 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "587--604",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "605--605",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dehnad:1989:SWI,
  author =       "Khosrow Dehnad",
  title =        "A simple way of improving the login security",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "607--611",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfleeger:1989:MPT,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger and
                 Mary Frances Theofanos",
  title =        "A methodology for penetration testing",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "613--620",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900540",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bong:1989:OSI,
  author =       "Dieter Bong and Christoph Ruland",
  title =        "Optimized software implementations of the modular
                 exponentiation on general purpose microprocessors",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "621--630",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "631--632",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "633--640",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900576",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "641--642",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PN,
  author =       "Anonymous",
  title =        "Pages 550--642 ({November 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:Ef,
  author =       "Harold Joseph Highland",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "644--646",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:RBBh,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "647--657",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:DVN,
  author =       "Harold Joseph Highland",
  title =        "Datacrime virus and new anti-virus products",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "659--661",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Preston:1989:RV,
  author =       "Charles M. Preston",
  title =        "Review of {VIRUSCAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "663--668",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1989:VVS,
  author =       "Harold Joseph Highland",
  title =        "{VCHECKER} --- a virus search program",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "669--674",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jobusch:1989:SPMb,
  author =       "David L. Jobusch and Arthur E. Oldehoeft",
  title =        "A survey of password mechanisms: Weaknesses and
                 potential {improvements.Part 2}",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "675--689",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:IBRh,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "691--691",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Varadharajan:1989:VNS,
  author =       "Vijay Varadharajan",
  title =        "Verification of network security protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "693--708",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramaswamy:1989:SAD,
  author =       "Raju Ramaswamy",
  title =        "Security architecture for data transfer through
                 {TCP\slash IP} protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "709--720",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thuraisingham:1989:FVM,
  author =       "M. B. Thuraisingham",
  title =        "A functional view of multilevel databases",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "721--730",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "731--732",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "733--739",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "741--741",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:AI,
  author =       "Anonymous",
  title =        "Author index",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "743--743",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488990014X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:SI,
  author =       "Anonymous",
  title =        "Subject index",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "745--749",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1989:PD,
  author =       "Anonymous",
  title =        "Pages 644--749 ({December 1989})",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}